• 13 Apr 2010

    My webinar this week: Data Protection: The Realities of Proactive vs. Reactive

    Join me tomorrow around lunchtime (or breakfast depending on where you're at) for a webinar on Data Protection: The Realities of Proactive vs. ReactiveI'm going to talk for ~20 minutes and we'll have a Q&A at the end.It's at 12pm ET and you can register here:https://www1.gotomeeting.com/register/936383032Hope to "see" you there!...

    Continue Reading...
  • 12 Apr 2010

    View every day as a blessing

    Between losing both grandmothers and helping my mom through a serious struggle she's having with cancer over the past 4 weeks combined with this news about Brian Tracy who has been a wonderful inspiration and mentor to me I'm compelled to say: View every day as a blessing for we truly don't know how much time we have here on Earth....

    Continue Reading...
  • 09 Apr 2010

    My 500th blog post + how does your salary compare to others?

    I just realized that this is my 500th blog post. Hopefully you're up to 500 more posts of my security nonsense!If you haven't seen it yet you should check out Global Knowledge's 2010 Salary Survey. It sheds some light on what you can and should be earning in IT and information security. Just remember that Global Knowledge is a training company and they want to tout how well -off you'll ...

    Continue Reading...
  • 07 Apr 2010

    Tools & techniques for hacking Windows servers & workstations

    Ever wonder how Windows servers get hacked? Perhaps you're unsure of which approach you need to use the get the most out of your security testing at the server and desktop levels? Or you may be wondering what you need to do to lock down Windows-based Web servers? Maybe you're curious about how Windows Server 2008 R2 stands up to security tests?Well, I've got just what you need to know ...

    Continue Reading...
  • 05 Apr 2010

    Pros and cons of disk imaging

    Disk imaging is one of those awesome technologies that so many businesses can benefit from yet so few people (at least from what I see) are using it. Here's a new piece I wrote for SearchDataBackup.com where I talk about the pros and cons of disk imaging and how you can benefit from it:Using disk imaging software in data backup and recovery...

    Continue Reading...
  • 02 Apr 2010

    THE process for successful Web security testing

    Here's a new piece I wrote for SearchSoftwareQuality.com where I talk about the lifecycle of testing for Web security flaws. From obtaining buy-in to reporting to the stakeholders, it's a process you need to master.Security testing best practices for today's Web 2.0 applications...

    Continue Reading...
  • 01 Apr 2010

    Two B I G reasons to secure your home computers/network

    Here's a crazy story: burglar breaks into a home, uploads child pornography on the family computer, and tries to frame the husband of his co-worker who he had a crush on.If this isn't a good enough reason to secure your home computers, I don't know what is.Not to mention your wireless network. How'd you like one of those creeps we used to see on Dateline's To Catch a Predator doing ...

    Continue Reading...
  • 30 Mar 2010

    A couple of neat things about WebInspect

    If you're into finding the Web security flaws that matter HP's WebInspect should be on your short list of prospective Web vulnerability scanners. Over the past six months WebInspect has repeatedly found a couple of items that I know I otherwise wouldn't have uncovered or been able to exploit to the extent I did.The first is SQL injection. WebInspect does a very good job finding the actual flawed inputs but ...

    Continue Reading...
  • 29 Mar 2010

    Don’t forget about XSS *behind* the login prompt

    Don't assume that your Web security concerns stop at the login prompt. Here's a new piece I wrote where I talk about cross-site scripting (XSS) and whether or not it matters for logged-in users:Authenticated XSS - problem or not?...

    Continue Reading...
  • 29 Mar 2010

    Got Linux security on your mind?

    Here's a new webcast and accompanying podcast I recently recorded for SearchEnterpriseLinux.com where I share some insight and opinions regarding the biggest weaknesses I'm seeing with Linux today...and what you can do about it:Tightening down Linux security (webcast)Tightening down Linux security (podcast)...

    Continue Reading...