• 25 May 2011

    Web appsec compliance & low-hanging fruit – it’s all up to us!

    Here are some recent pieces I wrote on Web application security common sense for my colleagues at Acunetix that you may be interested in:But Compliance is Someone Else’s Job!Low-hanging fruit becomes big news with the 2011 Verizon Data Breach reportGoing Beyond Confirmed Web Security FlawsEnjoy!As always, be sure to check out www.principlelogic.com/resources.html for links to my 500+ articles, whitepapers, podcasts, webcasts, books and more....

    Continue Reading...
  • 25 May 2011

    Texas Comptroller’s Office IT woes = security breach

    Here's a Dallas Morning News story I was interviewed for - interesting IT woes in the Texas comptroller's office:Texas comptroller’s tech office had high turnover, employee complaints before breach Thanks go out to Kelly Shannon and my colleagues over at Focus.com for getting me involved....

    Continue Reading...
  • 25 May 2011

    If you don’t have NetScanTools Pro v11, you’re missing out

    It's been a long time coming but the latest incarnation of one of my favorite network/security tools - NetScanTools Pro v11 - is out. Kirk Thomas at Northwest Performance Software has done a bang-up job on the user interface in the new version...something that's gotten better - albeit slowly - over the years. Not that I could do any better - I can't imagine having to know network protocols at ...

    Continue Reading...
  • 23 May 2011

    Sony PlayStation discussion download

    In case you missed our Sony PlayStation Security Fiasco roundtable discussion last week, here's a link to the MP3 recording.Enjoy!...

    Continue Reading...
  • 23 May 2011

    Recap of TechEd 2011: more of the same, but you need to go

    Given that TechEd was held in my neck of the woods this year I couldn't resist the opportunity to check it out. It's funny, I've been working with/around Microsoft products for some 22 years now and I've *never* attended this show. Maybe it's my ingrained Novell bigotry that I've yet to shed.My main goal was to catch up with some clients and see the latest happenings with Security Compliance Manager ...

    Continue Reading...
  • 20 May 2011

    Newt is setting an example for all of us this week

    I truly believe that Newt Gingrich is currently setting an excellent example of how we should live our lives. He's principled. He's unwavering. The man is unbreakable. Sure, he has made some bad choices and has stuck his foot in his mouth a few times. Answer me this: Who hasn't!? Look at what the liberal media and those who are threatened by his ideas are throwing at him this week. ...

    Continue Reading...
  • 19 May 2011

    Not all experience is good

    As with golf, racing cars or whatever, just because you have "experience" doesn't mean you're on top of your game. I just came across a quote that sums this up nicely - especially for those of us in IT and information security:"Experience is valuable only if it's imbued with meaning from which one can draw salient conclusions. Otherwise, experience becomes imprisoning." -Barry McCaffrey...

    Continue Reading...
  • 18 May 2011

    Parents: Need access to your child’s Facebook account? Just get Big Brother involved.

    Here's a bit on the proposed law by Democrat Ellen Corbett from California on Facebook being forced to give parents access to their kids' Facebook pages (CA SB 242). I don't disagree with the premise of parents getting or needing access...It's just sad that the government has to get involved.In fact, why do parents need the government to get this information from their kids in the first place!? Well, we ...

    Continue Reading...
  • 16 May 2011

    Today’s dicussion on the Sony PlayStation Security Breach

    Join us for this roundtable teleconference on Monday, May 16, 2011 at 1pm PT / 4pm ET with yours truly, Andrew Baker, Anton Chuvakin, John Pirc and Richard Stiennon where we will discuss the recent Sony PlayStation Network security breach. Topics will include:• Sony is now implementing new security measures; should these have been in place all along?• What does Sony need to do to restore confidence in their network ...

    Continue Reading...
  • 13 May 2011

    Need secure email? Look at what bin Laden did.

    Here's a good read on the lengths Osama bin Laden when to in order to keep his electronic communications under wraps. I won't spoil the details but it's a pretty old school approach. Check it out and imagine being in one of the coffee shops where the emails were being sent out...I wonder if his thumb drives were encrypted?? Like many, I doubt they thought that one through. :-)...

    Continue Reading...