• 29 Jul 2010

    Neat demo of XSS on Facebook

    Here's an informative video and accompanying article by the folks at Acunetix showing the exploitation of XSS on Facebook. It demonstrates how XSS can not only be made into a serious flaw but also how it's carried out in the background without the user ever knowing about it....

    Continue Reading...
  • 21 Jul 2010

    Good Web application security resource

    In typical monster corporation style, Hewlett-Packard's Web site is painfully difficult to browse around, much less find what you're looking for when it comes to, well, pretty much anything. There is an exception however that benefits all of us in information security. It's HP's Application Security Center Resource Library. It's chock full of goodies from HP (and former SPI Dynamics) engineers, developers, and Web security evangelists.In addition to more recent ...

    Continue Reading...
  • 20 Jul 2010

    Sometimes it’s the little things that’ll get you

    If you're like me you've likely experienced in your daily life how something seemingly innocuous or too simple can create a big problem. Here's a new piece I wrote where I talk about this issue with regards to Web security:Web security oversights: Don’t overlook the “small” stuffWith information security there's usually no need to sweat the small stuff....just don't overlook it altogether!...

    Continue Reading...
  • 19 Jul 2010

    Lessons learned & reminded of this past week

    After taking this past week off to be with my family during my mother's passing I'm back to work this week. I wanted to thank each and every one of you who reached out and sent cards and kind words to me during this tough time. It really meant a lot.There's one thing I learned this past week. It's that no matter how much you think you're prepared, how much ...

    Continue Reading...
  • 12 Jul 2010

    A joyous announcement

    Early this morning my mother, Linda Parks Beaver, left this earth and joined the angels. Her fight with cancer is over. Her pain is over. Her suffering is over. She's now resting in peace. God bless her soul.Many heartfelt thanks to the support and kind words so many of you have given me this year. And thanks so much to my clients and business colleagues who've been so understanding and ...

    Continue Reading...
  • 09 Jul 2010

    The reactive nature of policies that people ignore

    I got stuck in a traffic jam while passing through the famous and lovely town of Kennesaw, GA yesterday because of this unattentive truck driver trying to cross a raised railroad crossing:I wonder what part of the No Trucks sign he didn't understand. There's another sign out of the frame that warns truckers of a $1,000 fine if they cross there. Ouch!This situation can be compared to the disconnected and ...

    Continue Reading...
  • 09 Jul 2010

    Unique resource for managing Windows logs

    I like the practical avenue Randy Franklin Smith (@randyfsmith) has taken with his new Windows Audit Logging Kits. I haven't seen them but I like his approach.Check them out here:http://www.ultimatewindowssecurity.com/securitylog/rosetta/default.aspx...

    Continue Reading...
  • 01 Jul 2010

    Lack of security in SMBs? Only if you make it so.

    This new piece from Dark Reading on lack of security in SMBs hits some interesting points. I agree with the fact that many SMBs overlook security, at least until it's too late. But I see things a bit differently than some of the things stated and quoted such as:"SMB have historically not given security much thoughts""With budgets so slim, organizing security in an SMB is difficult"SMBs make up a large ...

    Continue Reading...
  • 28 Jun 2010

    Secure your home Wi-Fi or forever hold your peace

    Google has provided us with yet another reason to keep our home wireless networks secure. Speaking of that, in case you're wondering where things stand, here's a great tool for finding out just how vulnerable your wireless network utilizing WEP and WPA-PSK can be.Our society's continued privacy invasion never ceases to amaze me. And we, by and large (especially with Google), just blow it off and move on....

    Continue Reading...
  • 28 Jun 2010

    Mobile security problems & solutions: our podcast from Gartner

    Eric Green has put together a very-well produced podcast from last week's Gartner conference where Larry Ponemon, Stan Gatewood, and I discussed mobile security risks and metrics on the show floor.Also, check out Eric's other podcasts on his site...very sharp guy....

    Continue Reading...