• 17 Jun 2008

    Thought for the day on security policies

    Here's an interesting quote I just came across that fits nicely into the mold of security policy management and enforcement:"The test for determining the scope of this provision must not be subject to manipulation by those whose power it is designed to restrain." - from the Supreme Court's decision restoring the writ of habeas corpus...

    Continue Reading...
  • 16 Jun 2008

    So, when it happens to YOU it deserves attention…?

    So, U.S. Representative Frank Wolf's computers have gotten hacked into...Now he's wasting everyone's time on the House floor by calling for greater protection of congressional computer and information systems. What a dummy!Mr. Wolf: computers are getting hacked left and right day in and day out in business and in government. So now that you've been victimized we all of a sudden need tighter controls!? How about obeying your own law ...

    Continue Reading...
  • 16 Jun 2008

    Interesting product to protect source code

    If you write Windows apps (standard 32-bit or .NET) and want to protect them against reverse engineering and tampering check out V.i. Labs Code Armor. I haven't used it so I can't comment on how well it works...it just seems like a neat product.While most organizations have many, many security issues at a much higher level they need to focus on first, I could see such a product as a ...

    Continue Reading...
  • 13 Jun 2008

    New PCI assessor quality assurance program!?

    What? You mean that when an organization pays thousands and thousands of dollars to become a PCI assessor it doesn't guarantee the quality of their work is going to be top notch!!?? An assessor quality assurance program is in the works....? Is the marketing machine failing these vendors?I'm shocked. ;-)...

    Continue Reading...
  • 13 Jun 2008

    My security content from this week

    Here's an information security article of mine that was published this week:The realities of PCI DSS 6.6 application code reviewsI'll have a follow-up to this one on the realities of Web application firewalls coming soon.As always, for my past information security content be sure to check out www.principlelogic.com/resources.html.Enjoy!...

    Continue Reading...
  • 11 Jun 2008

    100% Secure Site? Yeah, right…

    I was ordering some Aqua Globes today (I don't normally fall for these as-seen-on-TV products but this one seems to fit a need I have) and saw on their site a bold statement of "100% SECURE SITE". You can see it here. Apparently the same folks that have infiltrated other e-commerce sites claiming "HACKER PROOF".Wow - what a BOLD statement!I wonder how often they test their site/application using automated scanners ...

    Continue Reading...
  • 10 Jun 2008

    How to stumble across new Web vulnerabilities

    I just learned how a lesser-known Web vulnerability scanner can prove to be as valuable as the big dog high-end scanners. Acunetix Web Vulnerability Scanner - an excellent Web scanning tool, especially for the price - found a weak Web login/password combo. Obviously something that can lead to all sorts of security issues. It would take a lot more time and effort to uncover this in a real-world Web security ...

    Continue Reading...
  • 08 Jun 2008

    The essence of security policies in most organizations

    I just came across this quote which really stood out as a concise analogy of information security policies in most organizations:"The United States is a nation of laws: badly written and randomly enforced." - Frank ZappaAnd people wonder why they still have security problems......

    Continue Reading...
  • 08 Jun 2008

    Why PCI DSS gets the attention of management

    I was thinking about all the hype surrounding PCI DSS requirement 6.6 compliance. The deadline is just three weeks away. I do a lot of compliance-related work and have seen the interpretation of 'compliance' all over the map. Why is PCI DSS any different?Well, for the most part, it's not like other regulations such as HIPAA and GLBA where many in management give it lip service but don’t really do ...

    Continue Reading...
  • 06 Jun 2008

    My security content from this week

    Here's an information security article of mine that was published this week:How insiders hack SQL databases with free tools and a little luckAs always, for my past information security content be sure to check out www.principlelogic.com/resources.html.Enjoy!...

    Continue Reading...