I "tweeted" about this but I had to post it here as well. I just realized that my new article for SearchSoftwareQuality.com on XSS actually executes JavaScript when loading because of some sample code I inserted into it!! It's not actual XSS but looks like it! Ahh the irony.Finding cross-site scripting (XSS) application flaws checklistBTW, I'm working on getting it resolved......
Continue Reading...British prime minister Benjamin Disraeli once said "To be conscious that you are ignorant of the facts is a great step to knowledge." What a great quote related to information security...in the context of both users and management. There are people out there who understand the basics of information security risks. It's all the other people you need to focus on. Here's how you can build credibility and get others ...
Continue Reading...If you're on Twitter you may want to check out your followers - at least their pictures...I'm getting a lot of people with racy photos. Maybe I'm just developing a new fan base of people who feel really comfortable around me! ;-)And to think that I could have a few hundred more followers on Twitter if I didn't filter out the junk!...
Continue Reading...If you can, check out today's Wall Street Journal - page A20. I talk about sensitive information being mismanaged on mobile devices. You may already know how I feel about mobile security...what's it going to take to fix this issue?...
Continue Reading...Here are a few new pieces just published. Enjoy!The lowdown on PCI complianceTesting rich Internet applications: 2009's best free toolsBig Brother or lowly minion - finding your role in ITBe sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts, my Twitter updates, and more....
Continue Reading...We're getting completely drenched here in the South. Pouring rain nonstop for four days and it's not supposed to let up for another few days. Must be all that "global warming". Seriously we've been hearing about reduced sun spot activity as of late (just not so much in the mainstream media because that would go against their religion). Some scientists (likely the ones whose jobs aren't tied to taxpayer funding) ...
Continue Reading...Here's a link to a post I just made that you may be interested in:4 things you can do right now to find out if your business is at risk...
Continue Reading...In case you're looking around, here's a good overview of security products that our peers like....
Continue Reading...Here's my latest information security content. Hope you enjoy!Big IT Lessons Small Businesses Can Learn (an IncTechnlogy.com piece I contributed to)How often should I change the passwords for my bank and other important online accounts? (a Women's Health magazine piece I contributed to)Web 2.0 application security troubleshooting, testing tutorialHIPAA-covered entities, business associates confront HITECH Act rulesTen sure-fire ways to derail your career in IT What you should know about cloud ...
Continue Reading...A while back I wrote about the importance of patching third-party software on your enterprise desktops. Apparently third-party applications are still out of the security loop. It's a seemingly small problem but it can have pretty big consequences....
Continue Reading...