People often ask me what's the best way to get a job in the information security field and I often reply with getting hands-on experience, that's the key. I delve into this topic in my audio programs Getting Started in Security and Certifications, Degrees, or Experience - What's Best for Your Security Career?. In fact, this very question was the basis and inspiration for me to create those audio programs.Well, ...
Continue Reading...Here's my latest information security content - more from the queue coming soon...just waiting for it to be published.Here's a webcast I recorded for SearchCIO.com:Continuous Data Protection (CDP) Strategies for the EnterpriseHere are two whitepapers I wrote for Realtimepublishers.com on behalf of Credant:Navigate the Future of HIPAA ComplianceData Protection for the Evolving WorkforceAs always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts ...
Continue Reading...Have you heard of GhostNet? It's a computer spying ring traced to China. I read about it in my local paper a few weeks ago and it's pretty intriguing stuff. Imagine what the computing world is going to look like 15-20 years from now. Are the superpowers going to be holding each other hostage electronically? Amazing stuff....
Continue Reading...Here's a recap of some of the themes at the RSA 2009 conference...with Mike Rothman's bias of course. Funny how things haven't changed all that much....
Continue Reading...I came across some very laughable Web-site password requirements with some sites I've used recently that I wanted to share. The need for us to use strong passwords/passphrases on the Web is pretty obvious. I also believe in balancing security with reality and not going overboard.My first example is just that: overboard. It's AT&T Wireless. Check out their ridiculous password requirements:Your password is case-sensitive and must:- Be six to twenty ...
Continue Reading...By now you probably know what I think about security policies. Well, I recently heard Herman Cain say that you cannot legislate a result (the war on achievement comes to mind here) but you can legislate a level playing field. What a great quote.Like I talked about here keep this in mind when creating/updating your security policies and keep this in mind when it comes to moving up and ahead ...
Continue Reading...Did you hear about the French First Lady's debacle yesterday? Apparently computer files, etc. containing some not so modest photos and videos of her were stolen. Ouch.Lesson learned: encrypt your laptop hard drives. No, no wait. How about not taking photos and videos of yourself doing things that you wouldn't want the whole world to see!...
Continue Reading...I just came across these research-based findings regarding effective PowerPoint slides. Really good stuff to keep in mind when you're putting together that next slide deck.Creating PowerPoint Based on Research...
Continue Reading...You've heard me say before here, here, and elsewhere that the marketing fluff created by IT and security product vendors is often nothing more than, well, fluff. Most marketer jargon lies somewhere between competitive advantage and political correctness and it usually makes for some comical reading.I heard some nonsense like this on my way into work this morning. It was regarding the swine flu. Apparently the brainiacs in the pork ...
Continue Reading......when you're working hard for your money this week. It shines a spotlight on what's happening on our world today and has some interesting security tie-ins as well. Funny how all of this stuff affecting our lives and careers is related."You cannot legislate the poor into freedom by legislating the wealthy out of freedom. What one person receives without working for, another person must work for without receiving. The government ...
Continue Reading...