• 20 May 2009

    I’m going to be on CNN at 5pm ET today

    I received a call from the producer of the CNN show The Situation Room With Wolf Blitzer today and ended up doing a TV interview. It's about the National Archive story that just came out regarding and external hard drive that recently went missing.Wonder if it was encrypted like I've ranted about here and elsewhere in the past? Probably not.It's going to be on in the 5pm ET hour on ...

    Continue Reading...
  • 19 May 2009

    I’ve been saying this for a while

    Apparently security researchers and Robert Abela with Acunetix agree with what I've been saying for a while: Web application firewalls aren't enough!Check out this post and the darkreading.com post it links to....

    Continue Reading...
  • 18 May 2009

    Tips on keeping your job these days

    I recently wrote about How to maintain IT shop efficiency when you're the last man standing (which reminds me I forgot to post this on my new content updates!).Well, here are some more tips that Linda Tucci with SearchCIO.com just wrote about.So there you go...two reading assignments. :-)...

    Continue Reading...
  • 13 May 2009

    Windows 7 – worth the wait?

    I've never been big on major OS upgrades however Windows 7 is looking promising. I installed Windows 7 RC on an older test system this past weekend and it actually seems to work well so far! I am having some video driver crashes but other than that it looks like MS may have actually fixed the quirkiness with Vista. I always liked the Vista interface (Windows 7 has it) but ...

    Continue Reading...
  • 12 May 2009

    Secure code by force?

    The Senate Homeland Security Committee, in their infinite wisdom, prodded by SANS' Alan Paller apparently believe they can legislate secure software from IT vendors.That'd be like legislating more secure health records, and personal financial information, and so on. Oh wait, that has been done. And it's not working all that well as far as I can tell.That'd also be like legislating higher-quality cars. Ha! The Feds can work that out ...

    Continue Reading...
  • 12 May 2009

    New version of Acunetix WVS is coming

    I just downloaded and am eager to try out the latest from the guys at Acunetix: Acunetix Web Vulnerability Scanner version 6.5 beta. It seems like they just came out with version 6.0! My last post on it was only a couple of months ago.Acunetix WVS 6.5 beta has a new feature called "file upload forms vulnerability checks" which they claim is an industry first. This is interesting because I ...

    Continue Reading...
  • 12 May 2009

    Do two wrongs make a right?

    I came across this bit recently on whether or not it's considered illegal hacking if security vendors and researchers become Internet crime fighters.Maybe it's just me but I think this is risky behavior. Want to hack something? Then setup your own systems to hack...or find a willing participant or paying client, get their permission in writing, and do it the right way....

    Continue Reading...
  • 11 May 2009

    One of the best ways to get experience

    People often ask me what's the best way to get a job in the information security field and I often reply with getting hands-on experience, that's the key. I delve into this topic in my audio programs Getting Started in Security and Certifications, Degrees, or Experience - What's Best for Your Security Career?. In fact, this very question was the basis and inspiration for me to create those audio programs.Well, ...

    Continue Reading...
  • 11 May 2009

    My latest security content

    Here's my latest information security content - more from the queue coming soon...just waiting for it to be published.Here's a webcast I recorded for SearchCIO.com:Continuous Data Protection (CDP) Strategies for the EnterpriseHere are two whitepapers I wrote for Realtimepublishers.com on behalf of Credant:Navigate the Future of HIPAA ComplianceData Protection for the Evolving WorkforceAs always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts ...

    Continue Reading...
  • 11 May 2009

    Insight into the future of spying?

    Have you heard of GhostNet? It's a computer spying ring traced to China. I read about it in my local paper a few weeks ago and it's pretty intriguing stuff. Imagine what the computing world is going to look like 15-20 years from now. Are the superpowers going to be holding each other hostage electronically? Amazing stuff....

    Continue Reading...