• 17 Aug 2009

    You have to check out this magazine

    I may have mentioned it a while back but it deserves repeating. There's a (relatively) new information security magazine called Hackin9 that's chock full of good material. It's sort of like 2600 and then some. Definitely worth a read if you're into staying up with the latest hacking tools and techniques....

    Continue Reading...
  • 17 Aug 2009

    Life planning – are you a passenger or driver?

    There's a great quote that really motivates me to do my own thing and ensure I'm the person dictating how things come about in my life: "If you don't have goals for yourself then you're doomed forever to achieve the goals of someone else." Here's a great quote from Jim Rohn that reiterates this point:"If you don't design your own life plan, chances are you'll fall into someone else's. And ...

    Continue Reading...
  • 16 Aug 2009

    Worst moments in network security history?

    This "10 worst moments in network security history" is a little light but I did enjoy slides 4, 5, 6, and 9. Check it out....

    Continue Reading...
  • 14 Aug 2009

    When you can’t find a job, just sue your school?!

    I've been out of commission this week updating my book Hacking For Dummies and fighting computer problems (more on this later)...but I'm *finally* getting back into the groove and wanted to share this.It's a case of today's gimme mentality rampant around the world. Apparently a student who couldn't find a job after graduating from Monroe College sued her alma mater for not helping her find a job. Wow, so not ...

    Continue Reading...
  • 10 Aug 2009

    Finally, an upgrade to ISA Server

    Here's a bit about Microsoft's forthcoming Threat Management Gateway. Certainly worth considering if you're an ISA Server fan and potentially a competing solution to some of the third-party gateway security solutions on the market....

    Continue Reading...
  • 10 Aug 2009

    Security focus in 6 out of 11 growing certifications

    More good news on the security front. Although I'm a strong believer that certifications aren't everything (they're really only a small part of information security career success), there's good news as well. More than half of the IT-centric certifications that have grown in value (i.e. jump in salary) over the past three months are security certifications. Love the statement by David Foote "[Companies are] starting to look at security as ...

    Continue Reading...
  • 07 Aug 2009

    SaaS replacing the OS?

    I just saw a press release from a company claiming that their SaaS solution "Makes the OS Obsolete!".Remember back in the mid-90s when the thin-client 'NC' (network computer I think it was called) was going to take the world by storm? Funny how the more things change the more they stay the same......

    Continue Reading...
  • 06 Aug 2009

    A must-attend show for technology professionals

    If you give presentations at work, for clients, at conferences or seminars, or you just want to become a better presenter overall you have to check out a show that's coming to my hometown in October called PowerPoint Live.I haven't attended any of their previous shows but I purchased their handouts and presentation content from last year's show and it's great stuff. Now, this year, I'm going to force myself ...

    Continue Reading...
  • 06 Aug 2009

    Bob Varsha and I

    I know, this is more of a Facebook-type post but since I don't hang out there too much I thought I'd post it here. Here's a pic of me and Bob Varsha - the voice of Formula 1, Barrett-Jackson Auctions, etc. on the SPEED channel. I met him at a motorsports event here in Atlanta recently. Really nice guy. For you NFL fans, that's Michael Jenkins of the Atlanta Falcons ...

    Continue Reading...
  • 05 Aug 2009

    Why you need to read privacy policies

    In case you haven't heard, apparently our Imperial Federal Government was at it again with their recent draconian privacy policy on the Cash for Clunkers web site. Here's a snippet of the policy:"Any or all uses of this system, any or all uses of this system and all files on this system may be intercepted, monitored, recorded, copied, audited, inspected, and disclosed to authorized CARS, DOT, and law enforcement personnel ...

    Continue Reading...