• 11 Jan 2012

    Great year for my book Hacking For Dummies, 3rd edition

    2011 was a great year for me in so many ways. I feel extremely blessed and very lucky. Part of this was related to my book Hacking For Dummies, which is now in its third edition. I knew that sales were up - I believe in large part due to all the speaking engagements I did for TechTarget and others.Well, I just found out from my publisher that it's safe ...

    Continue Reading...
  • 09 Jan 2012

    New Year’s Resolutions merely create gym overcrowding

    Be it New Year's resolutions (I'm going to lose weight this year!), career resolutions (I'm going to get a different job this year!) or financial resolutions (I'm going to get out of debt this year!)....traditional resolutions just don't work.Just check out how your local gym parking lot transforms between now and next month. I can't wait until around mid-February when the crowds will predictably die down and I can get ...

    Continue Reading...
  • 05 Jan 2012

    My Web app security epiphany: The Lysol Effect

    I just had an epiphany in the bathroom. I know, I know...bear with me.I thought to myself, Why is it people use Lysol to cover up, um, smells and such in the bathroom?? Sure Lysol kills the problem at the source but, goodness gracious, there are other means of consideration than to merely cloud up the bathroom covering up something that probably shouldn't be there in the first place! Know ...

    Continue Reading...
  • 03 Jan 2012

    Great quote to live by

    Here's one of my favorite #quotes you can apply to your career, regardless of which field you're in:"A successful life is one that is lived through understanding and pursuing one's own path, not chasing after the dreams of others." -Chin-Ning Chu...

    Continue Reading...
  • 03 Jan 2012

    Damballa’s Fight Against Advanced Malware

    Malware being out of sight and out of mind often creates the perception that risks aren't present. Just because there’s no perceived risk, doesn’t mean it’s not there. Heads buried in the sand over the real malware threat leads to breaches that most organizations aren't prepared to handle. Having worked on a project involving an APT infection, I’ve seen first-hand how ugly this stuff can get.Endpoint protection isn’t enough. Analyzing ...

    Continue Reading...
  • 02 Jan 2012

    Let’s make 2012 the year we get past “compliance” as we’ve known it

    I hope your 2012 has gotten off to a grand start! Mine has. I believe this year is going to further demonstrate why we're working in one of the best possible fields in the world.To get things rolling this year, I wanted to share with you a few new pieces I've written for TechTarget's SearchCompliance.com regarding...well, compliance. It's one of those topics that tends to infuriate me when it comes ...

    Continue Reading...
  • 20 Dec 2011

    Holiday wishes and what’s in store for 2012

    I'd like to send out a special holiday wish to everyone: Merry Christmas, Happy Hanukkah and Happy New Year!This year has been extraordinarily great for me in my business and I owe it all to my clients, presentation and seminar participants, and purchasers of my books and audio content. Thank you very much!I have lots of neat things right around the corner including a YouTube video channel and new Security ...

    Continue Reading...
  • 17 Dec 2011

    WebInspect: How SQL injection testing *should* be done

    SQL injection is arguably the grandest of all security vulnerabilities. It can be exploited anonymously over the Internet to gain full access to sensitive information - and no one will ever know it occurred. Yet time and again it's either: overlooked by people who don't test all of their critical systems from every possible angle overlooked by people who haven't learned how to properly use their Web vulnerability scanners overlooked ...

    Continue Reading...
  • 16 Dec 2011

    AlgoSec & what happens when you don’t look for flaws from every angle

    I recently had the opportunity to see how well AlgoSec's Firewall Analyzer performs in a real-world security assessment. Long story short, Firewall Analyzer found a weak password on an Internet-facing firewall that would've gone undetected otherwise. A traditional vulnerability scanner didn't find it nor did two different Web vulnerability scanners. Nothing was uncovered via manual analysis either.Only AlgoSec's Firewall Analyzer found the weakness...no doubt a flaw that would've been exploited ...

    Continue Reading...
  • 15 Dec 2011

    Big-data-retention-storage-security…what a mess!

    I've written some new bits on storage security and data retention that you may be interested in...especially as your move your "big data" to the cloud in 2012. You are going to do that, right? ;-) Enjoy!Data security and backup encryption remain criticalSecure data storage strategies and budget-friendly security tools for SMBsHeading in the Wrong Direction with Data Protection?As always, be sure to check out www.principlelogic.com/resources.html for links to all ...

    Continue Reading...