From Windows to Linux - desktops to mobile devices - here are some recent pieces I've written for TechTarget that you may be interested in:Devise a Windows XP end-of-life strategy before migrating to Windows 7Troubleshooting Windows 7 with built-in tools and online resourcesSecuring the new desktop: enterprise mobile devicesCommon Linux Security policy management gaps...
Continue Reading...A study in the Netherlands has found that Wi-Fi radiation will eventually result in the death of parts of tree leaves. Yep, take those access points and put them 20 inches from trees and let the killing being. Seriously!?Who's putting their access points that close to trees? Why are people even studying something like this? Apparently the "global warming" crowd is up to it again...I'm just glad those were Dutch ...
Continue Reading...It's been an interesting and truly scary news week in the "good old" U.S. of A. Think about this stuff folks:A Democrat congressman in charge of the House Ways and Means Committee with jurisdiction over taxes gets reprimanded for not paying taxesA judge is busted for buying drugs to use with a stripperSan Francisco banning circumcision and toys in Happy Meals And, of course, TSA minions doing things like giving ...
Continue Reading...Here are some recent pieces I've written on Web application security and testing that you may be interested in. From getting started in your career to cloud security to doing Web application security testing the right way...check 'em out:The secrets to getting started in your software testing careerFour skills that will make you a better web security professionalBuilding solid security requirements Security oversights in the cloud: Asking the tough questionsWhy ...
Continue Reading...Elcomsoft just released their new version of Elcomsoft Internet Password Breaker which now supports Chrome, Opera, Safari and Firefox. In essence the program can recover passwords, sensitive form data and so on that users have conveniently stored in their browsers for the past, oh, several years. Furthermore, the tool can now instantly recover Microsoft Outlook, Outlook Express, Windows Mail and Windows Live Mail account info, user IDs, passwords and cached ...
Continue Reading...Here's a good piece that Entrepreneur Magazine put together for SMBs to ensure they have a secure information systems environment. I don't disagree with any of the recommendations. What I do find interesting is that there's no mention of "determine where you're weak".Be it in the beginning before you put all of the recommended controls in place (and potentially saving yourself a lot of time/money if it's determined you don't ...
Continue Reading...Here are a couple more pieces I wrote for SearchEnterpriseDesktop.com where I ponder the utility of Windows Firewall as well as a few things you may not have thought about regarding Microsoft Security Essentials:Weighing Windows Firewall for enterprise desktop protectionMicrosoft Security Essentials may protect non-enterprise users in your businessMicrosoft Security Essentials – when it may not be a good fit...
Continue Reading...I've been so busy working that I've failed to post some timely pieces I wrote over the summer...here's one of them:Intel's McAfee buy marks a turning point for securityI truly believe we cannot even fathom how this acquisition will impact us long term....
Continue Reading...Here are some recent SearchEnterpriseDesktop.com pieces I wrote regarding Windows 7 security...enjoy!Using Windows 7's built-in features to keep your desktops secureWindows 7 doesn’t end the need to monitor passwords...
Continue Reading...Information security vendor Venafi released a survey at the October Gartner show that has some interesting findings related to encryption management:Organizations anticipate a 27% year-over-year certificate and key inventory growth rate85% of organizations manage encryption certificates and private keys manually via spreadsheet and reminder notes 78% of organizations have experienced system downtime due to encryption failures in the past 12 monthsGiven what I see in my information security assessments - ...
Continue Reading...