Tech Support For Dummies

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 30 September 2009

My latest security content

Posted on 04:52 by Unknown
Here's my latest information security content...many more to come soon! Hope these prove to be of value to you.

Finding cross-site scripting (XSS) application flaws checklist

The Windows Report - Analyzing the IT Job Market (podcast)

Be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts, my Twitter updates, and more.
Read More
Posted in careers, cross-site scripting, Kevin's security content, web application security, web browser security | No comments

Tuesday, 29 September 2009

XSS in my article on XSS!?

Posted on 09:02 by Unknown
I "tweeted" about this but I had to post it here as well. I just realized that my new article for SearchSoftwareQuality.com on XSS actually executes JavaScript when loading because of some sample code I inserted into it!! It's not actual XSS but looks like it! Ahh the irony.

Finding cross-site scripting (XSS) application flaws checklist


BTW, I'm working on getting it resolved...
Read More
Posted in cross-site scripting, web 2.0, web application security | No comments

Know of anyone who is "ignorant of the facts"?

Posted on 05:26 by Unknown
British prime minister Benjamin Disraeli once said "To be conscious that you are ignorant of the facts is a great step to knowledge."

What a great quote related to information security...in the context of both users and management. There are people out there who understand the basics of information security risks. It's all the other people you need to focus on. Here's how you can build credibility and get others on your side with information security.
Read More
Posted in great quotes, information security quotes, security leadership, security management, selling security | No comments

Thursday, 24 September 2009

Do you have racy photos on Twitter too?

Posted on 09:27 by Unknown
If you're on Twitter you may want to check out your followers - at least their pictures...I'm getting a lot of people with racy photos. Maybe I'm just developing a new fan base of people who feel really comfortable around me! ;-)

And to think that I could have a few hundred more followers on Twitter if I didn't filter out the junk!
Read More
Posted in twitter | No comments

Wednesday, 23 September 2009

Quoted in today's WSJ

Posted on 10:13 by Unknown
If you can, check out today's Wall Street Journal - page A20. I talk about sensitive information being mismanaged on mobile devices. You may already know how I feel about mobile security...what's it going to take to fix this issue?
Read More
Posted in compliance, kevin's quotes, mobile security, stupid security, unstructured infromation | No comments

Monday, 21 September 2009

My latest security content

Posted on 14:43 by Unknown
Here are a few new pieces just published. Enjoy!

The lowdown on PCI compliance

Testing rich Internet applications: 2009's best free tools


Big Brother or lowly minion - finding your role in IT

Be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts, my Twitter updates, and more.
Read More
Posted in careers, compliance, pci 6.6, pci dss, security management, security testing tools, web 2.0 | No comments

Swimming in Atlanta

Posted on 10:01 by Unknown
We're getting completely drenched here in the South. Pouring rain nonstop for four days and it's not supposed to let up for another few days. Must be all that "global warming". Seriously we've been hearing about reduced sun spot activity as of late (just not so much in the mainstream media because that would go against their religion). Some scientists (likely the ones whose jobs aren't tied to taxpayer funding) believe sunspot activity affects weather here on earth...like the really cold weather we've been having over the past couple of years...and all this rain.

I've always thought that it's quite cocky of man to believe he's powerful enough to change the climate but this guy has beat me to the punch. Some food for thought. That said "man changing the climate" is not what "global warming" is about anyway. But you already knew that.

Anyway, lots of homes and buildings flooded here in my neck of the woods should remind us all that business continuity - even if you work from home - is not something to take lightly. Have a great week, stay dry, and wish us luck!
Read More
Posted in business continuity, global warming | No comments

Friday, 18 September 2009

4 things you can do right now to find out if your business is at risk

Posted on 08:24 by Unknown
Here's a link to a post I just made that you may be interested in:
4 things you can do right now to find out if your business is at risk
Read More
Posted in compliance, security assessments, small business | No comments

Reader's choice on best security products

Posted on 05:36 by Unknown
In case you're looking around, here's a good overview of security products that our peers like.
Read More
Posted in cool products, security tools | No comments

Wednesday, 16 September 2009

My latest security content

Posted on 13:09 by Unknown
Here's my latest information security content. Hope you enjoy!

Big IT Lessons Small Businesses Can Learn (an IncTechnlogy.com piece I contributed to)

How often should I change the passwords for my bank and other important online accounts? (a Women's Health magazine piece I contributed to)

Web 2.0 application security troubleshooting, testing tutorial

HIPAA-covered entities, business associates confront HITECH Act rules

Ten sure-fire ways to derail your career in IT

What you should know about cloud backup security (a podcast Q&A)

Be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts, my Twitter updates, and more.
Read More
Posted in backups, careers, cloud computing, compliance, government regulations, hipaa, hitech act, online backup, online safety, passwords, small business, web 2.0, web application security | No comments

Third-party apps still a big security issue

Posted on 09:54 by Unknown
A while back I wrote about the importance of patching third-party software on your enterprise desktops. Apparently third-party applications are still out of the security loop. It's a seemingly small problem but it can have pretty big consequences.
Read More
Posted in change management, patch management, security management, stupid security, third-party applications | No comments

Parental software, is this where we're headed!?

Posted on 09:43 by Unknown
Be careful which parental monitoring software you install on your kids' computers. Looks like some people think their content filtering software is a means to capture the text of IM chats for the purposes of marketing intelligence. Sickening.

Good reason to use a network analyzer to see what's being sent out of your computers/networks! Get an executive or IT admin on one of these computers talking about sensitive subjects and its (unsuspected) data leakage at its finest.
Read More
Posted in content filtering, network analysis, privacy, uncool products | No comments

Have you seen this movie yet?

Posted on 08:01 by Unknown
I took a couple of days off to celebrate the completion of my freshly-updated book Hacking For Dummies, 3rd edition. More on this to come...Anyway, during this time off I went to see the movie District 9 that was most excellent. One of the best flicks I've ever seen. Extremely creative with good acting too! You have to see it while it's still in theaters!!
Read More
Posted in message from Kevin | No comments

Monday, 14 September 2009

Boston Beer a big let down

Posted on 04:13 by Unknown
I heard a Samuel Adams beer commercial on the radio this morning that reminded me of the big let down I had from them recently. I was at a speaking engagement on physical / data center security on behalf of Anixter in Boston (pronounced Bahstun for those of you here in the South with me) and wanted to see some of the sights while I was there.

Being a fan of Sam Adams I hopped (like the pun?) onto their Web site to get tour information. Wasn't there. Seriously....I called their sales # and was told they don't handle tour information there. I was transferred to the "tour guy". No answer - had to leave a message. I kindly asked that he return my call with the basics. Never heard back.

Now, remember, I just wanted basic tour information (where, when, how much). Hey Jim Koch, you're obviously proud of your beer, how hard does it have to be to get tour information??? What a let down...

Now I have a negative association every time I hear a Sam Adams commercial or see Sam Adams beer in the store. Hey at least there's a handful of microbrew alternatives like Flying Dog. And, go figure, they actually have tour information on their Web site. Took me all of 4 seconds to find it. Next time I'm in Maryland maybe I'll pay them a visit.

Anyway, just had to get that off my chest.

Hope you have an excellent week...back in touch soon.
Read More
Posted in customer no service, data centers, Kevin's seminars, physical security | No comments

Wednesday, 9 September 2009

Loving BitLocker so far...

Posted on 12:38 by Unknown
I recently wrote about Windows BitLocker's false sense of security and I've made it loud and clear that I'm a big advocate of encrypting mobile drives. Well, since I had to reload my laptop recently I decided to take the plunge into Windows 7 la la land and, at the same time, decided to try out BitLocker rather than reload PGP whole disk encryption. I don't know if I'm missing something but, golly, I sure do like it so far....It's seamless. I especially enjoy how it handles removable storage devices so conveniently. [fingers crossed]
Read More
Posted in bitlocker, laptop encryption, laptop security, mobile security | No comments

Tuesday, 8 September 2009

Why Most PowerPoint Presentations Suck

Posted on 02:02 by Unknown
That got your attention, huh? Mine too when I first came across this gem of a book by Rick Altman. It's pretty much all you need to know about what to do - and just as importantly, what not to do - with Microsoft PowerPoint. It has a no nonsense approach to making your presentations better. Mandatory reading for all college students, perhaps??




By the way, Rick Altman is bringing his show to Atlanta in October (the 11th through the 14th). For those of you here in my neck of the woods, Rick is graciously offering a two for one registration here. I'm really looking forward to it and hope to see you there!
Read More
Posted in careers, conferences, presentations, recommended books | No comments

Friday, 4 September 2009

My latest security content

Posted on 10:37 by Unknown
My goodness - it's been over a month since I've posted my latest security content...I've been so busy writing the stuff that posting the links has gotten put on the back burner. Good problem to have! Anyway, here's my latest:

Networking to enhance your IT career

Toeing the company line – is it good or bad for your IT career?

Security and compliance can go together, when done in the right order

Making sense of regulatory compliance and data storage for SMBs

Run encryption the right way to ensure wireless network security

Free Windows security tools every admin must have

Nine common password oversights to avoid

Secure your Windows systems with proper password practices

Secure Windows XP before a Windows 7 upgrade

Essentials of static source code analysis for Web applications

Secure data destruction options for old backup tapes and disk (a piece I contributed to)

Whew...I think that's it for now!

As always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts, my Twitter updates, and more.
Read More
Posted in careers, compliance, data retention, encrypting data in transit, Kevin's security content, networking essentials, passwords, source code analysis, storage security, Windows, wireless security | No comments

Good info on balancing life and work

Posted on 10:04 by Unknown
It's something I work on every day - trying to balance my personal priorities with my work priorities. Being an entrepreneur and a capitalist often conflicts with the responsibilities I have at home. But I've found that it can be done if you choose to do so. Here's a good bit on balancing life and work to get you rolling. Enjoy...and have a nice, long, relaxing weekend!
Read More
Posted in success | No comments

Wednesday, 2 September 2009

Interesting flaw in Sears' Web site all too common

Posted on 10:47 by Unknown
Check out this bit about a security flaw recently revealed on Sears' Web site. As the researcher alluded to, hacking and security are way more than people exploiting known software flaws. There are so many other security issues with Web applications. I see it all the time when doing my manual analyses on Web sites/applications. The sky is the limit for these business logic vulnerabilities and I suspect it'll always be that way. I love being a consultant who performs Web security assessments - there's always something new and challenging!
Read More
Posted in security testing tools, vulnerability assessments, web application security | No comments
Newer Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • How you can get developers on board with security starting today
    Some people - including a brilliant colleague of mine - think security is not the job of software developers . In the grand scheme of things...
  • NetScan Tools LE - a must-have for investigators
    Have you ever had a need to run a program and get a relatively small amount of data just to do your job but end up getting caught in the com...
  • "Top Blogs" list & some home security considerations
    I think I may have found the first sign that my blog is growing and gaining some traction. I've made it to the Top 20 Home Security Blog...
  • Wooo...HIPAA audits are coming & the irony of KPMG's involvement
    I've always believed that compliance is a threat to business [hence why I help businesses take the pain out of compliance by addressing ...
  • Great tool for seeking out sensitive info on your network
    One of the greatest risks in business today is the issue of unstructured information scattered about the network waiting to be misused and ...
  • It's hard being human
    Cavett Robert once said something about character that resonates within information security - especially regarding ongoing management and l...
  • Dario Franchitti and I
    As many of you know I'm a motorsports nut -both as a driver and a fan. This provided the influence for my Security On Wheels logo. Well,...
  • The value of partial code scanning, now
    Check out my new piece on the business value of partial code scanning where I outline why it's better to start your source code analysi...
  • Be it in healthcare or infosec, the short term is for losers
    With all the doctor & hospital visits I've gone (and am still going) through with family members in the past few years, I've com...
  • Live from #RSAC: Cloud computing's got some kinks (but you knew that)
    I'm attending the RSA Conference this week and just sat through a panel discussion on cross-jurisdictional issues in the cloud. It was p...

Categories

  • active directory
  • application firewalls
  • APTs
  • aslr
  • atm security
  • audio programs
  • audit logging
  • automated scanner oversights
  • back to basics
  • backups
  • big brother
  • bitlocker
  • budget
  • business case for security
  • business continuity
  • BYOD
  • car hacking
  • careers
  • certifications
  • change management
  • checklist audits
  • cissp
  • clear wireless
  • cloud computing
  • communication
  • compliance
  • computer glitch
  • conferences
  • consulting
  • content filtering
  • cool products
  • cool sites
  • cross-site request forgery
  • cross-site scripting
  • csrf
  • customer no service
  • cybersecurity bill
  • data at rest
  • data breach laws
  • data breaches
  • data centers
  • data destruction
  • data leakage
  • data protection
  • data retention
  • database security
  • degrees
  • desktop management
  • disaster recovery
  • disk imaging
  • disposal
  • dns
  • document security
  • domino
  • DoS attacks
  • drive encryption
  • e-discovery
  • ediscovery
  • employee monitoring
  • encrypting data in transit
  • encryption
  • end point security
  • ethical hacking
  • exchange
  • experience
  • expert witness
  • exploits
  • facebook
  • FERPA
  • file integrity monitoring
  • firewalls
  • forensics
  • full disk encryption
  • global warming
  • goal setting
  • good blogs
  • government intrusion
  • government regulations
  • great quotes
  • hacking
  • hardware
  • hipaa
  • hitech
  • hitech act
  • home security
  • humor
  • identity access management
  • identity theft
  • IIS
  • incident response
  • information classification
  • information security quotes
  • intel
  • intellectual property
  • internal threat
  • java
  • Kevin's books
  • Kevin's interviews
  • Kevin's keynotes
  • kevin's panels
  • kevin's quotes
  • Kevin's security content
  • Kevin's seminars
  • Kevin's videos
  • laptop encryption
  • laptop security
  • legal
  • Linux
  • locking screens
  • low-hanging fruit
  • malware
  • marketing hype
  • message from Kevin
  • messaging security
  • metasploit
  • metrics
  • mobile apps
  • mobile security
  • motivation
  • multi-factor authentication
  • network analysis
  • network complexities
  • network protocols
  • network security
  • networking essentials
  • Novell
  • office
  • online backup
  • online safety
  • open source security
  • owasp
  • p2p
  • passwords
  • patch management
  • patching
  • pci 6.6
  • pci dss
  • PCNAA
  • penetration testing
  • people problems
  • personal responsibility
  • phishing
  • physical security
  • pii
  • podcasts
  • policy enforcement
  • politics
  • presentations
  • privacy
  • quality assurance
  • recommended books
  • recommended magazines
  • recycling
  • remote access security
  • ridiculous password requirements
  • risk analysis
  • risk management
  • rogue insiders
  • ROI
  • RSA 2012
  • running a business
  • saas
  • salary
  • scary stuff
  • sccm
  • sdlc
  • security assessments
  • security audits
  • security awareness
  • security committees
  • security leadership
  • security management
  • security operations
  • security policies
  • security policy
  • security scans
  • security standards
  • security statistics
  • security technologies
  • security testing tools
  • security tools
  • selling security
  • sharepoint
  • small business
  • smartphone security
  • SMBs
  • social media
  • software development
  • source code
  • source code analysis
  • special offer
  • SQL injection
  • sql server
  • ssl
  • storage security
  • student information systems
  • stupid security
  • success
  • telecommuting
  • testimonials
  • thinking long term
  • third-party applications
  • threat modeling
  • time management
  • training
  • twitter
  • uncool products
  • unstructured information
  • unstructured infromation
  • user awareness
  • vendors
  • virtual machine security
  • visibility
  • voip
  • vulnerability assessments
  • web 2.0
  • web application security
  • web browser security
  • web server security
  • webcasts
  • WebInspect
  • whitelisting
  • whitepapers
  • Windows
  • Windows 7
  • windows 8
  • windows 8.1
  • Windows Mobile
  • windows security
  • Windows Vista
  • wireless
  • wireless security
  • zero tolerance

Blog Archive

  • ►  2013 (35)
    • ►  November (3)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  July (3)
    • ►  June (1)
    • ►  May (4)
    • ►  April (4)
    • ►  March (4)
    • ►  February (5)
    • ►  January (5)
  • ►  2012 (77)
    • ►  December (2)
    • ►  November (2)
    • ►  October (4)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (5)
    • ►  March (10)
    • ►  February (14)
    • ►  January (16)
  • ►  2011 (163)
    • ►  December (15)
    • ►  November (11)
    • ►  October (9)
    • ►  September (16)
    • ►  August (13)
    • ►  July (8)
    • ►  June (13)
    • ►  May (18)
    • ►  April (16)
    • ►  March (13)
    • ►  February (13)
    • ►  January (18)
  • ►  2010 (170)
    • ►  December (10)
    • ►  November (14)
    • ►  October (7)
    • ►  September (27)
    • ►  August (20)
    • ►  July (8)
    • ►  June (15)
    • ►  May (4)
    • ►  April (23)
    • ►  March (21)
    • ►  February (11)
    • ►  January (10)
  • ▼  2009 (55)
    • ►  December (5)
    • ►  November (10)
    • ►  October (21)
    • ▼  September (19)
      • My latest security content
      • XSS in my article on XSS!?
      • Know of anyone who is "ignorant of the facts"?
      • Do you have racy photos on Twitter too?
      • Quoted in today's WSJ
      • My latest security content
      • Swimming in Atlanta
      • 4 things you can do right now to find out if your ...
      • Reader's choice on best security products
      • My latest security content
      • Third-party apps still a big security issue
      • Parental software, is this where we're headed!?
      • Have you seen this movie yet?
      • Boston Beer a big let down
      • Loving BitLocker so far...
      • Why Most PowerPoint Presentations Suck
      • My latest security content
      • Good info on balancing life and work
      • Interesting flaw in Sears' Web site all too common
Powered by Blogger.

About Me

Unknown
View my complete profile