• 04 Jan 2011

    Supererogation helps infosec

    I saw a great Word of the Day from Merriam-Webster over the Christmas break: Supererogation It means "the act of performing more than is required by duty, obligation, or need". Said another way it's going the extra mile above and beyond to make things happen.If there's any one underlying component of being successful in everything you do it's doing all the other things that need to be done in security ...

    Continue Reading...
  • 02 Jan 2011

    Security complacency & leadership – focus on both in 2011

    Happy New Year! Here are a couple of recent pieces I wrote for Security Technology Executive magazine I thought would be good to get things rolling for 2011:Don't lose sight of what's importantFour traits of successful information security leadersMy wishes to you and yours for a healthy and prosperous year ahead!...

    Continue Reading...
  • 23 Dec 2010

    Quick step-through of Metasploit Express

    I've been raving about the penetration testing tool Metasploit for a while. With the release of Metasploit Express earlier this year I'm even more pleased with all the efforts HD Moore and his team have put forth. Metasploit Express is a commercial product you'll have to pay for but to me it's well worth the investment. It's easier to use, it has nice reporting and more. All the things we ...

    Continue Reading...
  • 20 Dec 2010

    Tips and tricks on e-discovery, forensics, and managing esi

    Here are a few pieces I wrote and recorded for SearchCompliance.com on managing all that electronic data on your network that you're constantly drowning in...Leaning on records management can take the angst out of e-discoveryWhy you need to create an ESI strategy (webcast)Why you need to create an ESI strategy (podcast)What is computer forensics technology? Does it help compliance?...

    Continue Reading...
  • 20 Dec 2010

    Possible bomb at Newark, ratchet up security!!??

    I heard a news story this morning about the possible bomb that was found at Newark Airport. The reporter went on to say that TSA is "ratcheting up security" and searching bags with more scrutiny in the event the threat is real.What I want to know is (and can't seem to find the answer to): why is it we "ratchet up security" when a such threat is detected rather than ...

    Continue Reading...
  • 19 Dec 2010

    MS Exchange security + hacking and hardening SQL Server

    Here are some new articles I've written for TechTarget that you may be interested in:Nine Exchange server risks you don’t want to overlookTen hacker tricks to exploit SQL Server systems (and oldie that I recently updated)Do you need to harden SQL Server 2008 R2?Enjoy!...

    Continue Reading...
  • 15 Dec 2010

    This woman “did not have a plan B”, do you?

    Watch this intense video of the psycho at the Florida school board meeting firing at the superintendent who supposedly signed the papers leading to his wife losing her job.Shows that you've always got to have an escape route. Be it with information security, driving down the road, or attending a meeting such as this.Of course, this was a situation in a government school building where only the criminals can have ...

    Continue Reading...
  • 13 Dec 2010

    Metrodome collapse video: nothing’s really secure

    Check out this video of the Metrodome collapsing over the weekend. Let this be a reminder that no matter:how much engineering goes into a systemhow much attention to detail the contractors pay during constructionhow much insurance coverage you havehow detailed and "water tight" your contracts arehow many fail-safe features are available "just in case"...that bad things can and will happen. Be it in a building or on your network there's ...

    Continue Reading...
  • 10 Dec 2010

    Canon’s digital camera image originality not so original

    How's this pic for an attention grabber?!Well, the folks at Elcomsoft have done it again. This time they've discovered a vulnerability in Canon's Original Data Security system demonstrating that digital image verification data can be forged. Apparently Canon has yet to respond.Why is this a big deal? Well, it's impactful for the media, for forensics investigators, and for those of us in infosec as digital images are used in many ...

    Continue Reading...
  • 09 Dec 2010

    The WikiLeaks lack of security responsibility & mental disorder connection

    Last week I wrote out some talking points in preparation for a TV interview with the Canadian Broadcasting Corporation on the WikiLeaks issue and what businesses can do to keep their information secure. At the last minute they ended up not doing the segment so I thought I'd post my perspective here:The leaks are not the problem – it’s the choices and all the events to lead to information being ...

    Continue Reading...