• 22 Jan 2010

    What are your thoughts on Web hosting / colo providers?

    Better think things through when giving up the reigns and letting a third-party Web hosting or colo provider run the show:When using a Web hosting provider can be bad - really bad - for your businessYou'd think Network Solutions would have better security controls in place.When will people pull their heads out of the sand? Maybe never??Speaking of this specific vulnerability, here's a recent bit I wrote on Acunetix's blog ...

    Continue Reading...
  • 22 Jan 2010

    My latest information security content

    Here are my latest information security articles and a podcast focusing on Web security and document security. Enjoy!First, my Web security articles:Changes coming to the OWASP Top 10 in 2010 (read the comments too, I stirred the puddin' with this piece!)Free Web proxy tools you need to get to knowSecuring Web servers in Windows environments...and a document security podcast (this is a really interesting story if you haven't heard about ...

    Continue Reading...
  • 20 Jan 2010

    Twitter – how about some capacity planning?

    Keep getting the Twitter is over capacity this morning. Good sign they're popular...still not good for business....

    Continue Reading...
  • 15 Jan 2010

    I’m featured in the new issue of Entrepreneur Magazine

    Check this out. I'm featured in the January 2010 issue of Entrepreneur Magazine's Ask A Pro section where I talk about employee monitoring:Entrepreneur Magazine, January 2010. © 2010 By Entrepreneur Media, Inc. All rights reserved. Reproduced with permission of Entrepreneur Media, Inc.In this piece, it may not be clear whether or not I support monitoring of employee email so let me clarify. I'm not for micromanagement and Big Brother but ...

    Continue Reading...
  • 14 Jan 2010

    Resolutions are for Losers

    It's been proven - and most of us have experienced the fact that - that New Year's resolutions don't work. We say we're going to do this or stop doing that and it may seem to work for a week or maybe a month but, interestingly, we always seem to get back to our same old ways.Take your local gym for instance. The next time you drive by (or visit) ...

    Continue Reading...
  • 11 Jan 2010

    Introducing my new book – Hacking For Dummies, 3rd edition

    Well, after months of edits, additions, and subtractions my new piece of work has finally arrived: Hacking For Dummies, 3rd edition I just received my copies last week and it should be in bookstores any time - if it's not already. Hacking For Dummies, 3rd edition is also available on Amazon.com (at a 34% discount to boot!).So, how is this 3rd edition different or better from the previous editions? In ...

    Continue Reading...
  • 07 Jan 2010

    My latest security content, Linux-style

    Hope your first week of the last decade of the new millennium is going well!Here's some more new information security content - focusing on Linux security this time around. Enjoy!Finding password weaknesses in your Linux systemsHardening Linux with Bastille UNIXUsing BackTrack to check for Linux vulnerabilitiesMany thanks to Leah Rosin with SearchEnterpriseLinux.com for getting me on board with these.You know the drill - as always, be sure to check out ...

    Continue Reading...
  • 07 Jan 2010

    Great information security quote

    This sends a message, huh?:"All that is necessary for the triumph of evil is that good men do nothing." -Edmund BurkeIt's not just applicable to information security - it also applies to the War on Islamic Terrorism...uhum, I mean "Man-Caused Disaster"....

    Continue Reading...
  • 04 Jan 2010

    My latest security content

    Here's some more new information security content - stuff on network administration, employee monitoring, checklist audits, and more. Enjoy!How to get - and keep - user support with security How to get management on board with Web 2.0 security issues Underlying causes of inconsistent patch management Are your IT administrators trustworthy? Monitoring user activity with network analyzersPriorities for your sound regulatory compliance management policy Go beyond a checklist audit for ...

    Continue Reading...
  • 23 Dec 2009

    My latest security content (finally!)

    I can't believe it's been this long! I've been so busy writing and haven't made the time to post my links. No excuses. Anyway, here's my latest information security content - some good stuff on politics and careers that can help you get off to a nice start in 2010.Networking with the bigwigs to gain support for ITDos and don'ts when serving on an IT committeeFive things you need to ...

    Continue Reading...