• 28 Jan 2011

    Take patch management out of IT’s hands completely?

    Here's a piece by CNET's Stephen Shankland on continuously updating software and patch management. Not sure where things will end up (we're already halfway there with this technology) but it's something that certainly couldn't hurt security....

    Continue Reading...
  • 24 Jan 2011

    Web application security testing: how much is enough?

    How often should you test your Web sites and apps for #security flaws? Well, it depends of course! Here's a new bit I wrote where I delve into the different variables and things you need to be thinking about:How often should you test your web applications?Enjoy....

    Continue Reading...
  • 24 Jan 2011

    My book Hacking For Dummies is now in 3 languages

    I was just told by my acquisitions editor at Wiley that my book Hacking For Dummies is being made available as an Italian language publication.English, Estonian (I know, who would've thought!?) and now Italian...cool....

    Continue Reading...
  • 23 Jan 2011

    Cybersecurity schmybersecurity

    Here are a couple of #cybersecurity pieces I authored for TechTarget's SearchCompliance.com regarding the proposed Rockefeller-Snowe Cybersecurity Act of 2009 (Senate Bill 773) and Lieberman-Collins-Carper Protecting Cyberspace as a National Asset Act of 2010 (Senate Bill 3480):Why the Cybersecurity Act is better for government than businessIs the latest cybersecurity bill an Internet takeover by the fed?You know how I am about government growth and its intrusion into the free market. ...

    Continue Reading...
  • 20 Jan 2011

    Skill to do comes of doing

    Ralph Waldo Emerson once made this statement which completely and totally applies to what you do in your job and how you develop your career over the long haul:"Skill to do comes of doing."As with surgeons, home builders, mechanics, race car drivers and so on...we learn most by doing.I know a lot of people are going back to school and focusing on getting their degrees and certifications right now. There's ...

    Continue Reading...
  • 19 Jan 2011

    Good bits to share about computer disposal

    Here's a good short read from SANS (@sansinstitute) you can share with your non-technical family members, friends & neighbors on why they need to careful when disposing of their computers and how they can do it properly....

    Continue Reading...
  • 19 Jan 2011

    More on the Ponemon Lost Laptop Survey

    Here's a short piece where I was quoted by Rod Scher in Processor magazine (a very good trade rag by the way) on the Ponemon Institute's Billion Dollar Lost Laptop study.Not only are the numbers astounding, this is a big problem that's growing every day - crying out for our attention....

    Continue Reading...
  • 11 Jan 2011

    My “new” book on ethical hacking turns 1

    Today marks the one year anniversary of the publication of my "new" book Hacking For Dummies, 3rd edition.Wow, how time has flown by! Thanks so much to those of you who have provided both kind words and constructive criticism via your emails, Amazon.com reviews, and in your own independent sites and blogs. No doubt it'll soon be time to start planning out the 4th edition. Until then......

    Continue Reading...
  • 11 Jan 2011

    Tidbits on MS security, MBSA vs. the competition & cloud backups

    Here are a few new articles I wrote for TechTarget where I talk about IIS 7.5 security, encrypting Windows Server drives, MBSA vs. commercial vulnerability scanners and the dearly beloved cloud backup services. Enjoy!How vulnerable is Microsoft IIS 7.5 to attacks?Pros and cons of Windows Server drive encryptionWeighing MBSA against paid vulnerability scannersPreventing online backup security threats to your network...

    Continue Reading...
  • 11 Jan 2011

    Beware the “network assessment”

    There are many IT services firms - including some run by friends and colleagues of mine - who perform something called "network assessments". The outcome of these assessments - which are usually aimed at SMBs - is to determine the overall health of your network and computing environment, supposedly including security.First, let me be clear that these are legitimate services to see where your network stands. That's fine and dandy ...

    Continue Reading...