Happy (almost) Labor Day...here's the latest from the criminal hackers: a DNS hack has redirected numerous websites of UPS, National Geographic, Acer, The Register and more. Nice. Betcha it was some low-hanging fruit someone, somewhere overlooked....
Continue Reading...Here's a fascinating story about a court case involving data retention you need to read. And pass it along to your management as well. It talks about how businesses aren't doing what they need to be doing with regard to data retention and how decisions are being made for us by the courts. Interestingly most businesses I come across (large and small) don't have any semblance of a data retention ...
Continue Reading...Check out my latest book published by Realtimepublishers.com:In Implementation Strategies for Fulfilling and Maintaining IT Compliance I share strategic and tactical methods for getting your arms around the compliance beast. You can download all the chapters (below) for free by signing up on Realtime's site. They've got a ton over other good content too.Here's the low down:Businesses are struggling more and more with the compliance requirements being pushed on them ...
Continue Reading...I'm speaking at the #Information Week/Dark Reading Virtual Trade Show How Security Breaches Happen and What Your Organization Can Do About It. My session is titled How to Win the War Against Cybercrime and starts at 2:30pm ET. Here are a few words about it: What are you doing to avoid becoming the next Wikileaks, Google, or Sony? Despite the fact that businesses will spend over 50 billion dollars worldwide ...
Continue Reading...Here's a new guest blog post I wrote for the folks at Credant: Heading in the Wrong Direction with Data Protection? You may see this differently but I think we're heading down the wrong path in this area - especially on phones and other mobile devices. I suspect we'll end up in a situation like we have recently in the U.S. where the very people putting the "stimulus" bill and ...
Continue Reading...I think I could write about Web application security every hour of every day...there's just so much involved with building secure apps, proper security testing, getting (and keeping) management on board and so on...But I wouldn't want to torture you in that way. Anyway, here are a few bits you may be interested in: Properly scoping your Web security assessments The cure for many Web application security ills How much ...
Continue Reading...Here are some new bits I've written about IT and information security careers. First, what you can do to stand out above the noise and move your career ahead: How IT pros can boost their worth -- and their salaries ...and second, what management can do to keep IT and security professionals interested in their jobs and on board with the business: How to retain your IT talent 8 best ...
Continue Reading...I've had to turn down 3 speaking engagements the weeks of October 10th & 17th because I'm, well, speaking at other shows those weeks. Maybe it's something about the weather that time of year? Perhaps discounted meeting facility rental rates? I suspect the real reason is that all the top-notch security speakers are busy then so the conference organizers are reaching out to second stringers like me. BTW, my apologies ...
Continue Reading...Join me today in TechTarget's SearchCompliance.com virtual tradeshow: Enterprise Risk Management: Mitigation Strategies for Today's Global Enterprise My presentation "Managing Network Security Threats with an ERM Strategy" starts around 3pm ET and I'll be doing a live Q&A just after....
Continue Reading...I just spent 6.5 minutes cracking a family member's laptop password in order to demonstrate the dangers of not having whole disk encryption. I then went on to spend 20 minutes+ of my life trying to sync some new music to an iPod Touch with the unbelievably difficult iTunes interface.... After investing a lot of time (that I'll never get back, mind you) I still didn't get the music synced. ...
Continue Reading...