It all comes down to this. I couldn't agree more."Eighty-five percent of the reason you get a job, keep that job, and move ahead in that job has to do with your people skills and people knowledge." - Cavett Robert...
Continue Reading...Can you tell I'm getting caught up on talking about some neat security tools worth checking out!? Well, here's another one: Amenaza's SecurITree that I first wrote about in my book Hacking For Dummies, 2nd edition. It's a decision support tool you can use to analyze specific threats to your business and the likelihood of attack. Threat modeling is something that many people do in their head "qualitatively" (or not ...
Continue Reading...If you're looking for a way to keep your Windows desktops locked down, safe from abuse, and clean reboot after reboot, check out Faronics Deep Freeze. It can save you a ton of time and headache......
Continue Reading...Finally, I've found an affordable and effective static source code analysis tool! It's called CxDeveloper - a product Israel-based Checkmarx that's distributed/supported by U.S.-based Security Innovation. Whew....it's a little confusing but what can you do.I've used CxDeveloper for over a year now and, like most products, it's not perfect. It crashes unexpectedly every now and then, it generates false-positives, its licensing process is kludgy and old-fashioned, and its reporting capabilities ...
Continue Reading...Here's my latest information security content you may be interested in: Testing rich Internet applications for security holes The pros and cons of host-based vs. appliance-based tape encryption As always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts and more....
Continue Reading...Here's my latest information security content you may be interested in:Gathering and documenting your Windows desktop security policiesSecurity essentials for Active Directory on LinuxWindows server hardening: How much is enough?Top Windows server hardening standards and guidelinesCommon Active Directory security oversightsDesktop security preparation for a new wave of Windows appsWindows desktop security standards documentation best practicesAs always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, ...
Continue Reading...I'm so glad other people are experiencing anti-malware bloat as well. It seems like I'm having to disable real-time anti-virus, etc. protection quite often to get certain things done. I'm sure Microsoft's forthcoming MSE will fix this. [not holding my breath...]...
Continue Reading...Yet another one for the hall of shame list. You know how I am about it, I'm sure this hard drive was encrypted. ;-)...
Continue Reading...OK, I've been busy and my articles have been stacking up. Here's the first set that were recently published. More to come later this week.Dumb things IT consultants doWhy it may not be ideal for your lawyer to be your compliance officerKeys to finding your IT consulting nicheIs all the PCI DSS compliance whining and complaining justified?Scoping your Web app security assessments for successEnjoy!As always, be sure to check out ...
Continue Reading...In this piece Tony Bradley provides some great insight into how Windows BitLocker "drive" encryption works in Vista and Windows 7. Actually BitLocker is not drive - or whole-disk - encryption after all...As Tony states it's more like whole-volume encryption.Keep this in mind when securing your laptop and mobile drives. This could create a pretty serious false-sense of security that everything's locked down when indeed it's not. Same as the ...
Continue Reading...