You may recall my appearance on CNN television earlier this year when a hard drive went missing from the National Archives and Records Administration. Well, apparently some lessons don't sink in. This time around the National Archives folks sent an unsecured hard drive containing personal info on 70 million+ veterans to a vendor for "repair and recycling" (huh?). Apparently an employee subverted a policy then had to go on leave ...
Continue Reading...Here's my latest information security content. Enjoy!Are you earning what you're worth in information security?Understanding the politics of information securityBe sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts, Twitter updates, and more....
Continue Reading...Researchers at Duke University have found out how to use the basic features of cell phones to determine specific traits of the "space" you're in. Big Brother tracking at its finest. Once mainstream, it'll be at this point when I stop using a cell phone....
Continue Reading...If you've been following me for any length of time you've probably noticed that development of my Security On Wheels audio programs has slowed way down. Let me explain why.In a nutshell, I'm practicing what I preach: "focus on your highest payoff tasks". With this economic mess we're in I've had to really buckle down and focus on billable work this year to keep my momentum up and ride out ...
Continue Reading...I just came across a great quote by "The Donald" (Trump) that contains a great little nugget to inspire us to do the best we can in our careers:"As long as you're going to be thinking anyway, think big."Practice this over and over and you'll eventually become what you think about. Sure, small and large annoyances will get in your way (like my rants here and on my Twitter page) ...
Continue Reading...Here's my latest information security content...many more to come soon! Hope these prove to be of value to you.Finding cross-site scripting (XSS) application flaws checklistThe Windows Report - Analyzing the IT Job Market (podcast)Be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts, my Twitter updates, and more....
Continue Reading...I "tweeted" about this but I had to post it here as well. I just realized that my new article for SearchSoftwareQuality.com on XSS actually executes JavaScript when loading because of some sample code I inserted into it!! It's not actual XSS but looks like it! Ahh the irony.Finding cross-site scripting (XSS) application flaws checklistBTW, I'm working on getting it resolved......
Continue Reading...British prime minister Benjamin Disraeli once said "To be conscious that you are ignorant of the facts is a great step to knowledge." What a great quote related to information security...in the context of both users and management. There are people out there who understand the basics of information security risks. It's all the other people you need to focus on. Here's how you can build credibility and get others ...
Continue Reading...If you're on Twitter you may want to check out your followers - at least their pictures...I'm getting a lot of people with racy photos. Maybe I'm just developing a new fan base of people who feel really comfortable around me! ;-)And to think that I could have a few hundred more followers on Twitter if I didn't filter out the junk!...
Continue Reading...If you can, check out today's Wall Street Journal - page A20. I talk about sensitive information being mismanaged on mobile devices. You may already know how I feel about mobile security...what's it going to take to fix this issue?...
Continue Reading...