• 18 May 2011

    Parents: Need access to your child’s Facebook account? Just get Big Brother involved.

    Here's a bit on the proposed law by Democrat Ellen Corbett from California on Facebook being forced to give parents access to their kids' Facebook pages (CA SB 242). I don't disagree with the premise of parents getting or needing access...It's just sad that the government has to get involved.In fact, why do parents need the government to get this information from their kids in the first place!? Well, we ...

    Continue Reading...
  • 16 May 2011

    Today’s dicussion on the Sony PlayStation Security Breach

    Join us for this roundtable teleconference on Monday, May 16, 2011 at 1pm PT / 4pm ET with yours truly, Andrew Baker, Anton Chuvakin, John Pirc and Richard Stiennon where we will discuss the recent Sony PlayStation Network security breach. Topics will include:• Sony is now implementing new security measures; should these have been in place all along?• What does Sony need to do to restore confidence in their network ...

    Continue Reading...
  • 13 May 2011

    Need secure email? Look at what bin Laden did.

    Here's a good read on the lengths Osama bin Laden when to in order to keep his electronic communications under wraps. I won't spoil the details but it's a pretty old school approach. Check it out and imagine being in one of the coffee shops where the emails were being sent out...I wonder if his thumb drives were encrypted?? Like many, I doubt they thought that one through. :-)...

    Continue Reading...
  • 12 May 2011

    Amazon’s cloud outage, big deal…?

    Here's a great piece from my colleague Jonathan Feldman on why Amazon's recent outage is irrelevant. It reminds me of my what I've always preached: if it's got an IP address, a URL or human beings involved, it's fair game. Something's going to happen eventually.It's our job to help our businesses/clients to be able to respond appropriately and minimize the impact when something does occur. You've gotta have a fall ...

    Continue Reading...
  • 12 May 2011

    Some tips for balancing work and play

    There's an old saying "Play as hard as you work" that I strive to live by. I've discovered that balancing work and personal time is one of the hardest - yet most important - things you can do as a human being. I found this to be doubly true after losing my mom to cancer last year and nearly losing my father to a heart attack this year.If you're looking ...

    Continue Reading...
  • 11 May 2011

    The new IT skill you *must* develop

    Yesterday I had lunch with some colleagues who are lawyers that focus their work in/around compliance, intellectual property and cloud computing. It was neat to hear their perspective on where things are headed in IT. We came to the conclusion that IT professionals are going to have to learn as much as they can about the legal side of what we do.I'm not talking compliance in general but also contracts, ...

    Continue Reading...
  • 04 May 2011

    From culture to products to malware to breaches – where do you stand?

    Here are some new opinion pieces on information security management that I wrote for Security Technology Executive magazine that you may be interested in:Don’t end up on the wrong side of a data breachFighting the malware fight all over again9 good reasons not to buy information security productsSecurity best practices without question?How's your security culture?Enjoy!As always, be sure to check out www.principlelogic.com/resources.html for links to all of my information security ...

    Continue Reading...
  • 04 May 2011

    SecureWorld Expo better than ever

    I attended this week's SecureWorld Expo in Atlanta and must say that the show is better now than ever before. I cut my professional speaking teeth with these guys speaking at dozens of their events between 2003 and 2007. I've taken some time off since but going back and seeing some of the same friendly faces brought back good memories.The best session I attended was William Hugh Murray's keynote on ...

    Continue Reading...
  • 03 May 2011

    My security speaking engagement this week

    Today I'm prepping and practicing for my Predictive Security event with TechTarget and CDW in Los Angeles this week. Really psyched about the show and visiting LA - I've never been.How I feel reminds me of the following quote from Whit Hobbs:"Success is waking up in the morning and bounding out of bed because there's something out there that you love to do, that you believe in, that you're good ...

    Continue Reading...
  • 29 Apr 2011

    Nikon Image Authentication vulnerability

    The fine folks at @Elcomsoft have discovered yet another security flaw in digital cameras. First it was Canon. This time it's Nikon - specifically Nikon's Image Authentication Software.Elcomsoft researchers found that the way the secure image signing key is being handled in the camera is flawed. This allowed them to extract the original signing key and then produce manipulated images that appear to be legit. I could see this being ...

    Continue Reading...