• 22 Mar 2010

    A sincere “Thanks!”

    Frederic Bastiat once said "When plunder becomes a way of life for a group of men living together in society, they create for themselves in the course of time a legal system that authorizes it and a moral code that justifies it." In the same spirit, I want to send out a sincere and heartfelt Thanks! to all my fellow Americans who voted for "Hope" and "Change" putting a Marxist-loving ...

    Continue Reading...
  • 22 Mar 2010

    Email security – using content filtering and incident response to round things out

    Here are some recent bits I wrote for SearchWinIT.com and SearchExchange.com to help you flesh out the security of your email environment:The state of email content filtering - and what you can doSolidify your Exchange email server incident response plan...

    Continue Reading...
  • 19 Mar 2010

    All the reasons you need to NOT buy security products

    We've all been subjected to the marketing hype the IT and security product vendors put out daily...Well, if you've been looking for ways to save some money, here's why you should not buy information security products:9 good reasons not to buy information security products...the marketing madness will never cease. We just have to grow wise and understand what to buy into and what to ignore....

    Continue Reading...
  • 19 Mar 2010

    New tips on 4 facets of encryption

    Been wondering about the latest on mobile/backup/database/email encryption? Well, here are some recent tips I wrote to TechTarget that'll help you get the ball rolling:Securing SMB laptopsSecuring removable media with BitLocker To GoSecure your data backups with encryption key management best practicesEncryption – the great security control that nobody’s usingThe true value of transparent data encryptionIs full email encryption the solution to Exchange security?...

    Continue Reading...
  • 19 Mar 2010

    No need to fix the problem, just ban the tool

    Here's a great post from my colleague Dave Paradi talking about how a conference is banning presenters from using PowerPoint. It's an embedded systems conference. So they're telling these highly-technical people they can't use PowerPoint to get their messages across!? I suspect the audience will instead be subjected to overhead transparencies and slide rule demonstrations. Sounds like a great show!This is just like businesses banning thumb drives and instant messaging ...

    Continue Reading...
  • 11 Mar 2010

    Unexpected vulnerabilities in the cloud?

    When you look past all the ridiculous hype and craze over "cloud computing" the realities set in. Here's a new piece I wrote for SearchCompliance.com that can help set you straight:Find unexpected vulnerabilities to ensure cloud compliance...

    Continue Reading...
  • 11 Mar 2010

    Twitter stole my Twitter idea

    I was recently talking to a client about how we need to start up a company with a Twitter acquisition as our exit strategy that scans for malicious URLs in the tinyurl, bit.ly, etc. links that are posted on Twitter. Twitter beat us to the punch. It's actually pretty difficult to comprehend that it's taken them this long to fix such a big problem. Nice to see some innovation where ...

    Continue Reading...
  • 11 Mar 2010

    Trouble getting policy buy-in? Make ’em self-executing.

    If you're having trouble getting security policies on the radar of management and users - much less getting the real buy-in you need, don't fret - there is a possible solution.It's an idea I got from Louise Slaughter (good name for a politician) and her attempt to force Obamacare on us. Simply make your policies "self-executing". In other words, you write the policies and include verbiage in each one that ...

    Continue Reading...
  • 24 Feb 2010

    Great information security quote

    "I am more afraid of an army of 100 sheep led by a lion than an army of 100 lions led by a sheep." -Charles TalleyrandApplies nicely to the management of information security and amazingly well to our government "leaders" today....

    Continue Reading...
  • 23 Feb 2010

    P2P risks, all over again

    It's sad when our government has to warn businesses about their own P2P network security flaws.I wrote about the security considerations with P2P applications seemingly a lifetime ago (2003) for TechTarget in a piece titled Are P2P applications worth the risk? Around this same time I served as a P2P expert on a panel discussion at American Intellectual Property Law Association's conference in Atlanta where we discussed these same issues.Nothing ...

    Continue Reading...