• 26 Mar 2010

    Great tool to check for weak Web passwords

    I've always been a fan of Acunetix Web Vulnerability Scanner. It's a lesser-known tool that packs a big punch. One of its most redeeming qualities is its password checking. As I mentioned in this post, Acunetix Web Vulnerability Scanner took what was going to be a basic assessment of an Outlook Web Access system with very few findings up many notches into a true penetration of the system...all thanks to ...

    Continue Reading...
  • 26 Mar 2010

    What’s the biggest Web vulnerability?

    Here's a new piece I wrote called The Top Web Vulnerability We Face. It's something I suspect will be around for a long, long time. I'm curious if you agree?...

    Continue Reading...
  • 23 Mar 2010

    Users *have* to start locking their screens when working remotely

    To continue on with the message in this previous post about users locking their screens while away from their computers I'm amazed at how naive people are with their computer usage in public places.I see it practically every time I'm at a coffee shop - someone leaves his/her laptop sitting at the table while he/she goes out to take a phone call, use the restroom, smoke a cigarette, talk with ...

    Continue Reading...
  • 23 Mar 2010

    Check out my new Web application security ebook

    Hot off the press...OK, hot off the computer - I've written an ebook on Web application security threats published by SearchSoftwareQuality.com - a great application development/QA site that's part of the TechTarget family.Download it and learn more about: New Web application security challengesAssessing your Web application securityBeating common Web security attacksHacking your own applicationsWeb application security best practices It's free - just sign up for it at Bitpipe.com....

    Continue Reading...
  • 23 Mar 2010

    Great quote on business and career success

    Harold Geneen once said "In business, words are words, explanations are explanations, promises are promises, but only performance is reality." Reminds me just how cheap talk can be when the marketing machine gets its way - especially with "cloud computing". Look more at the actions of businesses and people and less at the words. There you'll find what they're made of....

    Continue Reading...
  • 22 Mar 2010

    Our power of choice has been stripped

    No need for us to think any more. Here's a great excerpt from a WSJ piece that underscores the issue:"In our world of infinite wants but finite resources, there are only two ways to allocate any good or service: either through prices and the choices of millions of individuals, or through central government planning and political discretion."You hear me say a lot that those in control of information security have ...

    Continue Reading...
  • 22 Mar 2010

    Are you destroying your backup media the right way?

    Here's a recent podcast I recorded on backup media data destruction...better be sure you're doing it the right way:Ensuring proper data deletion or destruction of backup media...

    Continue Reading...
  • 22 Mar 2010

    A sincere “Thanks!”

    Frederic Bastiat once said "When plunder becomes a way of life for a group of men living together in society, they create for themselves in the course of time a legal system that authorizes it and a moral code that justifies it." In the same spirit, I want to send out a sincere and heartfelt Thanks! to all my fellow Americans who voted for "Hope" and "Change" putting a Marxist-loving ...

    Continue Reading...
  • 22 Mar 2010

    Email security – using content filtering and incident response to round things out

    Here are some recent bits I wrote for SearchWinIT.com and SearchExchange.com to help you flesh out the security of your email environment:The state of email content filtering - and what you can doSolidify your Exchange email server incident response plan...

    Continue Reading...
  • 19 Mar 2010

    All the reasons you need to NOT buy security products

    We've all been subjected to the marketing hype the IT and security product vendors put out daily...Well, if you've been looking for ways to save some money, here's why you should not buy information security products:9 good reasons not to buy information security products...the marketing madness will never cease. We just have to grow wise and understand what to buy into and what to ignore....

    Continue Reading...