Here's my one article from this week....shifting gears to Windows Mobile smart phones/handhelds:Windows Mobile OS security: Get it locked downFor all of my past information security content be sure to check out www.principlelogic.com/resources.html.Enjoy!...
Continue Reading...If you find yourself in Milan Italy on April 16, come by and join me! Here's the press release:Principle Logic’s Kevin Beaver to Keynote IDC Security ConferenceKevin Beaver, independent information security expert with Atlanta-based Principle Logic, LLC, will be keynoting the IDC Security Conference 2008 in Milan, Italy. Kevin will apply his practical and no-nonsense approach to security in his discussion titled Real World Security Problems You Can't Afford to ...
Continue Reading...When I first saw this headline, I thought to myself: Who's the detective that figured this out!? [tongue in cheek]FTP Sites Vulnerable to Data BreachesFTP poses risks?? Uh, yeah! It's just like another technology or host on the network. If it's software, addressable via IP, and has a user login prompt - then, it's undoubtedly going to have holes that are exploited eventually. Especially when network admins and security managers ...
Continue Reading...Speaking of Laura Chappell, if you're not familiar with her work, I recommend you check it out. As far as I'm concerned, she's the original networking guru/goddess/queen. She knows a lot about a lot when it comes to networking protocols, security, and forensics....If you've never been to one of her sessions or classes, you haven't lived (or learned) all you can about this field. Laura's got some great material - ...
Continue Reading...I was cleaning my office recently and found something that made me laugh. I don't remember exactly where I got it from for credit purposes but it *may* be from one Laura Chappell's BrainShare sessions way back when NetWare was cool. It defines those users that we've all had to deal with at some point in our careers:Power Users: Pc Operators Who Eventually Ruin, Unload, Screw up, Erase, and Remove ...
Continue Reading...Just one article published this week:The Essentials of Web Application Threat ModelingFor all of my past information security content be sure to check out www.principlelogic.com/resources.html.Enjoy!...
Continue Reading...One bite at a time, of course. Don't ever forget this when it comes to tackling big information security projects, writing your first article, putting together an important presentation, going down the path of writing a book - whatever. The day-to-day "little" stuff seems boring and unimportant but it's not. Here's a good quote that sums it up:"You have to put in many, many, many tiny efforts that nobody sees ...
Continue Reading...We all need a little inspiration every now and then. Here was mine for today. Learn to think this way and nothing can get in the way you succeeding in information security:"People are always blaming their circumstances for what they are. I don't believe in circumstances. The people who get on in this world are the people who get up and look for the circumstances they want, and if they ...
Continue Reading...Here's my latest stuff:Metasploit 3.1 updates improve Windows penetration testing Making the Business Case for Information Security[This is an interactive issue of the magazine. You'll need to click on Current Issue, then Contents, then the Contents graphic. You'll see my article listed. Click on it to go to it.]...and a related article:The Business Case for Information Security - What businesses are up against and why it is neededFinally, a podcast:Mobile ...
Continue Reading...I just came across this great quote by Anthony Robbins which can apply to your security career or to your organization's overall security - really anything in life:"If you do what you've always done, you'll get what you've always gotten."Love it!...
Continue Reading...