Here's a prime example of just how encryption/change management/policies/whatever else mean nothing when someone makes a bad decision related to information security. Why was this sensitive information unencrypted when it was moved to a new system? Hint Mr. Contractor: all it takes to easily re-encrypt sensitive data is something as basic as Winzip. If you have to decrypt it to use it...then just re-encrypt when you're done.If you're ever caught ...
Continue Reading...I was just thinking about all the passwords our Web browser(s) want save for us for the sake of convenience. It's a great feature that I know I couldn't live without. I know many other people do it too. If you're one of them, be very, very careful leaving your computer screen unlocked when you leave your desk - especially for lunch, for a meeting, or for the day. What ...
Continue Reading...Two weeks from this Friday - on June 20th, 2008 - I'll be giving the keynote presentation for the Georgia Society of CPA's Tech Conference...Here's the press release:Principle Logic’s Kevin Beaver to Keynote GA Society of CPA's Tech ConferenceKevin Beaver, independent information security expert with Atlanta-based Principle Logic, LLC, will be keynoting the Georgia Society of CPA’s 2008 Technology Conference. Kevin will apply his practical and no-nonsense approach to security ...
Continue Reading...Here's an interesting request by privacy and consumer groups to strong arm Google into posting its privacy policy on its home page. Apparently it's the law in California, but as we see day in and day out (especially in the state of California!) the rule of law doesn't really mean that much. It's majority - I mean mob - rule now in what used to be our Constitutional Republic.I don't ...
Continue Reading...Here are a couple of mailing lists worth checking out if you're looking for a new job in information security:http://jobcenter.ittoolbox.com (under 'Sign up for Job Alerts' - you may have to login)http://www.securityfocus.com/archive (select Security Jobs and enter your email address)You may get a lot of notifications, but if you're in the market, that's not a bad thing! I've seen some jobs posted that actually look pretty good....
Continue Reading...Here's an information security article of mine that was published this week:Free tools that can improve IIS securityAs always, for my past information security content be sure to check out www.principlelogic.com/resources.html.Enjoy!...
Continue Reading...I received an email yesterday from Redmond Magazine (a good trade rag) that caught my attention. The title of the email said "Trust in Web Site Security is Declining. What Should You Do?" I thought, really!?...are you serious? and well, I don't know what to do, let me see just what the solution is. [tongue in cheek]Low and behold it was an email sponsored by Verisign about their whitepaper entitled ...
Continue Reading...This is somewhat old news from last week but I've had it on my to-post list and just had to say something about it. Did you hear about the founder/CEO of LifeLock, Todd Davis? He's the guy with all the radio ads who gives away his social security number to help prove his fraud-prevention service is secure. Well, apparently someone duped him. Huh, you don't say!?Every single time I heard ...
Continue Reading...Here's my one information security article that was published this week:Writing software requirements that address security issuesAs always, for my past information security content be sure to check out www.principlelogic.com/resources.html.Enjoy!...
Continue Reading...When I got up this morning at 4:30am to complete a report I'm working on, I had to remind myself of a great quote by Elbert Hubbard and thought it'd make for a good post.It's the one thing that's helped me in my career and in my personal life more than anything else. Mr Hubbard said: “Self-discipline is the ability to make yourself do what you should do, when you ...
Continue Reading...