When you look past all the ridiculous hype and craze over "cloud computing" the realities set in. Here's a new piece I wrote for SearchCompliance.com that can help set you straight:Find unexpected vulnerabilities to ensure cloud compliance...
Continue Reading...I was recently talking to a client about how we need to start up a company with a Twitter acquisition as our exit strategy that scans for malicious URLs in the tinyurl, bit.ly, etc. links that are posted on Twitter. Twitter beat us to the punch. It's actually pretty difficult to comprehend that it's taken them this long to fix such a big problem. Nice to see some innovation where ...
Continue Reading...If you're having trouble getting security policies on the radar of management and users - much less getting the real buy-in you need, don't fret - there is a possible solution.It's an idea I got from Louise Slaughter (good name for a politician) and her attempt to force Obamacare on us. Simply make your policies "self-executing". In other words, you write the policies and include verbiage in each one that ...
Continue Reading..."I am more afraid of an army of 100 sheep led by a lion than an army of 100 lions led by a sheep." -Charles TalleyrandApplies nicely to the management of information security and amazingly well to our government "leaders" today....
Continue Reading...It's sad when our government has to warn businesses about their own P2P network security flaws.I wrote about the security considerations with P2P applications seemingly a lifetime ago (2003) for TechTarget in a piece titled Are P2P applications worth the risk? Around this same time I served as a P2P expert on a panel discussion at American Intellectual Property Law Association's conference in Atlanta where we discussed these same issues.Nothing ...
Continue Reading...Michael Eisner once said "Succeeding is not really a life experience that does much good. Failing is a much more sobering and enlightening experience."This is something we often take for granted...and something that's facilitated by our society of not wanting people (especially our kids) to fail.I wouldn't trade my failures in life for anything...they've gotten me to where I am today. Failure's always an option and not something to be ...
Continue Reading...According to Global Knowledge (you know, the training/certification folks), IT and security certifications are worth tens of thousands of dollars and, in some cases, over $100,000.Man oh man if it were only that easy to jump in and make that kind of money - and be able to sustain it. I say that certifications such as CISSP, ITIL, or PMP are worth absolutely nothing unless you make it so. What ...
Continue Reading...One of the greatest risks in business today is the issue of unstructured information scattered about the network waiting to be misused and abused by rogue insiders and other outsiders that have gained "internal" access.Reality has shown us that we absolutely cannot protect what we don't acknowledge. The best way to minimize this risk is to search your network far and wide for PII and other sensitive business information you ...
Continue Reading...Here are my latest information security articles covering policies, internal threats and employee monitoring, and (when all else, fails) incident response. Enjoy!Security policy oversights and mistakes we keep makingThe real deal with internal security threatsMonitoring user activity with network analyzersLack of incident response plan leaves hole in compliance strategyIncident response – the often overlooked component of business continuityAs always, be sure to check out www.principlelogic.com/resources.html for all of my information ...
Continue Reading...I've got a new monthly column in Security Technology Executive magazine called Get with IT you may want to check out. It's a real gem of a magazine!...
Continue Reading...