I often hear stories and radio commercials about the tough time college graduates are having right now finding work. In a recent bit, some recommendations were to work harder and get online because you've got to find a way to stand out in the eyes of potential employers in this market.Yeah, yeah...anybody can do those two things. But let's back up. There's one thing that most people don't do: it's ...
Continue Reading...CLEARly incompetent - that's how I rate @CLEAR Wireless' customer service. I signed up for their service about 6 weeks ago. It actually works pretty well. Great download speeds and so-so upload speeds. Still, overall, WiMax is an amazing technology.As much as I liked it I just couldn't bear the slow upload speeds so I decided to take the hit on the two months of service I prepaid for and ...
Continue Reading...Here are some recent articles I wrote for TechTarget's SearchDisasterRecovery.com and SearchCompliance.com on the relationships between DR planning and information security as well as records management and the dreaded e-discovery process. Serving as an expert witness on various information security cases, I can assure you that you'll want to be prepared for both - especially the latter:Disaster recovery security: The importance of addressing data security issues in DR plansLeaning on ...
Continue Reading...Thanks to TechTarget and CDW starting this month I'm embarking on an 11 city speaking tour across the U.S. Along with my colleague Pete Lindstrom, we'll be speaking/ranting about all sorts of network security and data protection stuff including:Embedding Security into the Network—Building Defense in DepthSecuring your Presence at the Perimeter: Contrary to Popular Belief, you do still have a Network PerimeterLocking Down Server and Workstation Operating Systems: A Critical ...
Continue Reading...Have you checked out the Chronology of Data Breaches lately?...Very interesting stats on known data breaches. I peruse the site through every now and then and it seems that every time I do there's an organization that 1) I've done business with (for personal stuff) or 2) as in the case of MicroBilt Corporation's breach posted last week they're right down the road from me.Does the six degrees of separation ...
Continue Reading...If I had to choose two things that IT and information security pros need to focus on more than anything else, it'd be learning how to manage your time and continually fine-tuning your technical skills.Well here are two pieces I wrote for SearchWinIT.com that that delve into these topics:Time management strategies for the IT proLow-cost ways to get the IT skills you need...learn these skills and practice them over and ...
Continue Reading...Join me and my colleagues/friends Becky Herold (The Privacy Professor) and Scott Woodison (security manager extraordinaire) on Focus.com tomorrow at 2pm ET where we'll be talking about:Compliance vs. managing information risks - there is a differenceCommon compliance-related mistakesRecent changes to information security and privacy regulations and how they affect youRecommendations on what your business can do to get its arms around the compliance beastIt'll be laid back yet informative...we'll no ...
Continue Reading...Here's a recent piece I wrote for my friends at SearchCompliance.com regarding the lost laptop problem and what it's costing businesses:The Billion Dollar Lost Laptop – What’s it costing your business?I've seen some naysayers out there stating that there's no way a lost laptop could match up to Ponemon's figures. I say why find out!? Whatever the cost, the solutions for laptop security are simple once the choice is made ...
Continue Reading...Here's one of those great quotes that applies directly to infosec:“Talent is cheaper than table salt. What separates the talented individual from the successful one is a lot of hard work.” -Stephen KingThere are plenty of people who understand security architecture, hacking and related technical issues but few who really get the essence of risk and have taken the necessary steps to make information security work in support of the ...
Continue Reading...The new edition of a very solid and unique magazine on security (both physical and IT) - Security Technology Executive - is now online.Be sure to check out the column I wrote in this issue entitled "Fighting the Malware Fight All Over Again" on page 21....
Continue Reading...