• 17 Jun 2010

    Got Domino? Don’t forget about security.

    Like Novell NetWare, there's plenty of Domino still running out there so we certainly can't be lax on security for that platform. Here are a couple of pieces I wrote regarding Domino security that you may be interested in:Domino security vulnerabilities to watch forGetting started with hardening Domino...

    Continue Reading...
  • 16 Jun 2010

    Data Protection and Compliance in Complex Environments

    Here's a new guide I just completed aimed at C-level information protection professionals:The three CREDANT-sponsored pieces cover:Primary Concerns of Regulatory Compliance and Data ClassificationFinding, Classifying and Assessing Data in the EnterpriseData Protection Reporting and Follow upSimply click the image above or browse to Realtime Publisher's landing page for this CSO Executive Series and download from there.By the way, Realtime has a ton of free content practically anyone in our field ...

    Continue Reading...
  • 16 Jun 2010

    Should Windows users have full admin rights?

    Here's a piece I wrote recently for SearchWinIT.com where I cover the never-ending debate about whether or not users should have administrative rights on their computers:Should Windows users have full administrative rights?If you have additional insight, please let me/us know. It's something every business can benefit from....

    Continue Reading...
  • 15 Jun 2010

    Oil rigs now, Internet later?

    Obama shuts down oil rigs - $330 million in lost wages per month. What's going to happen when he shuts down the Internet?Who gave this guy such power!?...elections have consequences....

    Continue Reading...
  • 14 Jun 2010

    Survival of the weakest?

    I just heard Neal Boortz discussing this Wall Street Journal piece about how people with the least amount of economic knowledge are making all the rules in America right now. Very interesting insight.Totally reminds me of management and other non-technical people making all the rules for information security and privacy.Something's backwards here folks. Why is it the tail wags the dog in so many critical situations such as these affecting ...

    Continue Reading...
  • 10 Jun 2010

    iPad “breach” – another sensationalistic Web flaw

    NewsFactor has a nice piece on the recent AT&T iPad "breach" that tells the story of how a code on AT&T's site was cracked exposing email addresses of iPad users. So, some criminals gleaned some email addresses from a telecom provider...In the grand scheme of things: big deal.I agree with Sophos' Paul Ducklin - I think this is being overblown...just like the sensationalism brought forth by my recent bit on ...

    Continue Reading...
  • 07 Jun 2010

    Oil and infosec, a marriage made in heaven?

    Here's a funny - and ironic - pic a friend of mine just forwarded me.Need I say more?Also, I have on my desk the March 8, 2010 edition of InformationWeek (great mag by the way) that has BP as its cover story. A call out quote says:"Two years ago, BP CEO Tony Hayward laid some very tough love on his 500 top managers. Despite revenue of about $300 billion, the ...

    Continue Reading...
  • 28 May 2010

    Where I’ve been + 2 important reading assignments

    Wow, I can't believe it's the end of May....the year's nearly halfway through and I feel like I should still be back in February! After experiencing some family health crises and deaths combined with the busiest year I've ever had with my business (not complaining there!), I've let my blog suffer. I never like to not post for so long but I work to stay true to what I preach ...

    Continue Reading...
  • 21 May 2010

    The compliance crutch mentality rides on

    I believe it was my colleague Kevin Bocek who once said: "Security done right will yield compliance for free. Compliance for compliance sake will always deliver more problems in the end."Why is it so many business leaders keep ignoring this reality?It's funny, I was just thinking about an article I co-authored for CSO Online with Charles Cresson Wood nearly a year ago entitled The Dangers of Over-Reliance on Compliance. Those ...

    Continue Reading...
  • 04 May 2010

    Aim high or aim low, it’s our choice to make

    I love what Michelangelo said:"The greater danger for most of us lies not in setting our aim too high and falling short, but in setting our aim too low and achieving our mark."...reminds me of how easy it is to fall into the trap of complacency and principle of "good enough" with information security....

    Continue Reading...