• 04 Jul 2009

    What are you celebrating today?

    For those of you in the U.S., Happy 4th of July! Proudly wearing my "Bill of Rights" shirt. I think my next purchase from one of my favorite stores, CafePress.com, is going to be this button:Kudos to the men and women who have fought for our freedom and independence to this point - cheers to all of you out there who still believe in it....

    Continue Reading...
  • 01 Jul 2009

    The definitive secret to success in your job and career

    It all comes down to this. I couldn't agree more."Eighty-five percent of the reason you get a job, keep that job, and move ahead in that job has to do with your people skills and people knowledge." - Cavett Robert...

    Continue Reading...
  • 30 Jun 2009

    Tool to take the pain out of threat modeling

    Can you tell I'm getting caught up on talking about some neat security tools worth checking out!? Well, here's another one: Amenaza's SecurITree that I first wrote about in my book Hacking For Dummies, 2nd edition. It's a decision support tool you can use to analyze specific threats to your business and the likelihood of attack. Threat modeling is something that many people do in their head "qualitatively" (or not ...

    Continue Reading...
  • 29 Jun 2009

    Great way to maintain desktop security & integrity

    If you're looking for a way to keep your Windows desktops locked down, safe from abuse, and clean reboot after reboot, check out Faronics Deep Freeze. It can save you a ton of time and headache......

    Continue Reading...
  • 29 Jun 2009

    Great source code analysis tool

    Finally, I've found an affordable and effective static source code analysis tool! It's called CxDeveloper - a product Israel-based Checkmarx that's distributed/supported by U.S.-based Security Innovation. Whew....it's a little confusing but what can you do.I've used CxDeveloper for over a year now and, like most products, it's not perfect. It crashes unexpectedly every now and then, it generates false-positives, its licensing process is kludgy and old-fashioned, and its reporting capabilities ...

    Continue Reading...
  • 26 Jun 2009

    My latest security content

    Here's my latest information security content you may be interested in: Testing rich Internet applications for security holes The pros and cons of host-based vs. appliance-based tape encryption As always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts and more....

    Continue Reading...
  • 24 Jun 2009

    My latest security content

    Here's my latest information security content you may be interested in:Gathering and documenting your Windows desktop security policiesSecurity essentials for Active Directory on LinuxWindows server hardening: How much is enough?Top Windows server hardening standards and guidelinesCommon Active Directory security oversightsDesktop security preparation for a new wave of Windows appsWindows desktop security standards documentation best practicesAs always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, ...

    Continue Reading...
  • 23 Jun 2009

    Running a computer without malware protection?

    I'm so glad other people are experiencing anti-malware bloat as well. It seems like I'm having to disable real-time anti-virus, etc. protection quite often to get certain things done. I'm sure Microsoft's forthcoming MSE will fix this. [not holding my breath...]...

    Continue Reading...
  • 22 Jun 2009

    Charles Schwab hard drive removed & then stolen

    Yet another one for the hall of shame list. You know how I am about it, I'm sure this hard drive was encrypted. ;-)...

    Continue Reading...
  • 22 Jun 2009

    My latest security content

    OK, I've been busy and my articles have been stacking up. Here's the first set that were recently published. More to come later this week.Dumb things IT consultants doWhy it may not be ideal for your lawyer to be your compliance officerKeys to finding your IT consulting nicheIs all the PCI DSS compliance whining and complaining justified?Scoping your Web app security assessments for successEnjoy!As always, be sure to check out ...

    Continue Reading...