Tech Support For Dummies

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 26 January 2010

Webinar on database security this week

Posted on 17:12 by Unknown
Here's a webinar put on by Application Security, Inc. that I'm participating in this Thursday (1/28/10) in case you're interested...should be enlightening.

Five Burning Questions Series: 2010 IT Security Auditor’s Roundtable
Read More
Posted in database security, security assessments | No comments

Friday, 22 January 2010

What are your thoughts on Web hosting / colo providers?

Posted on 09:14 by Unknown
Better think things through when giving up the reigns and letting a third-party Web hosting or colo provider run the show:

When using a Web hosting provider can be bad - really bad - for your business

You'd think Network Solutions would have better security controls in place.

When will people pull their heads out of the sand? Maybe never??

Speaking of this specific vulnerability, here's a recent bit I wrote on Acunetix's blog about on looking past layer 7 and fixing all Web-related issues.
Read More
Posted in hacking, stupid security, web application security, web server security | No comments

My latest information security content

Posted on 04:58 by Unknown
Here are my latest information security articles and a podcast focusing on Web security and document security. Enjoy!

First, my Web security articles:
Changes coming to the OWASP Top 10 in 2010 (read the comments too, I stirred the puddin' with this piece!)

Free Web proxy tools you need to get to know

Securing Web servers in Windows environments

...and a document security podcast (this is a really interesting story if you haven't heard about it)
Document redaction and the recent TSA leak

You know the drill - as always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, videos, Twitter updates, and more.
Read More
Posted in document security, government regulations, Kevin's security content, stupid security, web application security, web browser security, web server security | No comments

Wednesday, 20 January 2010

Twitter - how about some capacity planning?

Posted on 05:06 by Unknown
Keep getting the Twitter is over capacity this morning. Good sign they're popular...still not good for business.

Read More
Posted in business continuity, twitter | No comments

Friday, 15 January 2010

I'm featured in the new issue of Entrepreneur Magazine

Posted on 06:50 by Unknown
Check this out. I'm featured in the January 2010 issue of Entrepreneur Magazine's Ask A Pro section where I talk about employee monitoring:




























Entrepreneur
Magazine, January 2010. © 2010 By Entrepreneur Media, Inc. All rights reserved. Reproduced with permission of Entrepreneur Media, Inc.

In this piece, it may not be clear whether or not I support monitoring of employee email so let me clarify. I'm not for micromanagement and Big Brother but I am on the side of business when it comes to the issue of employee monitoring of email, social media, general browsing, or whatever which ultimately leads to improved information security.

Employees are there to provide some type of expertise, sweat labor, or other service in exchange for money. If people occasionally send/receive personal emails and surf the Web that's fine. You can't reasonably prevent that. However, if goofing off or otherwise putting your network and information at risk is most of what they do, huh uh. You wouldn't believe what I see (and the studies back it up) on the typical network: 50%+ network bandwidth consumed by streaming audio and video, majority of Internet browsing sessions going to Facebook, Twitter, etc.

This is not only a matter of people goofing off, being unproductive, and ultimately providing limited value to their employers but it's also creating a negative impact on the network - ultimately on IT. It's also creating security issues. Not only the malware threats but also the risk of sensitive information leaking out of the network. If employee Internet and computer usage are not being proactively monitored - regardless of the protocol or media - it's merely a free-for-all and a no doubt data breach in the making. The lesson here: know your enemy (hint: he's on your network right now) and do something about it.

Speaking of the internal threat, here's a new article I just wrote on what I believe is the real deal with the insider threat that you may be interested in.
Read More
Posted in big brother, content filtering, data leakage, employee monitoring, kevin's quotes, security policies, stupid security | No comments

Thursday, 14 January 2010

Resolutions are for Losers

Posted on 13:27 by Unknown
It's been proven - and most of us have experienced the fact that - that New Year's resolutions don't work. We say we're going to do this or stop doing that and it may seem to work for a week or maybe a month but, interestingly, we always seem to get back to our same old ways.

Take your local gym for instance. The next time you drive by (or visit) your local gym notice how crowded the parking lot is this time of year. With near 100% certainty I can say that it'll be packed. Why is this? Well, it's all those people who have made New Year's resolutions to "work out more" and "lose weight". Give it a month or two and watch the transformation. Your gym parking lot will be less and less crowed and by mid to late Spring it'll be back to "normal".

This is because resolutions don't work. Resolutions are merely wishes and empty promises to yourself. Period. Be it your personal life or your career the only sustainable way to move ahead from where you're currently at in life - and, most importantly, stay ahead - is to develop a sound set of goals for each area of your life, outline how you're going to go about accomplishing each goal, set deadlines, and hold yourself accountable. It's as "simple" as that. Here's a bit I wrote on this subject that tells you exactly what you need to do:

Eight steps to accomplishing your IT career goals

...You may also be interested in my Security On Wheels audio programs specifically Getting Started in Security and the forthcoming Succeeding in Security where I cover goals and much much more about what it takes to get ahead and stay ahead year after year...no resolutions need. Even if you're more of an IT generalist these audio programs are chock full of goodies you can benefit from.

Here's to an excellent 2010!!
Read More
Posted in careers, goal setting, security leadership | No comments

Monday, 11 January 2010

Introducing my new book - Hacking For Dummies, 3rd edition

Posted on 12:05 by Unknown
Well, after months of edits, additions, and subtractions my new piece of work has finally arrived: Hacking For Dummies, 3rd edition
Hacking For Dummies, 3rd edition

I just received my copies last week and it should be in bookstores any time - if it's not already. Hacking For Dummies, 3rd edition is also available on Amazon.com (at a 34% discount to boot!).

So, how is this 3rd edition different or better from the previous editions?
In this new edition, I believe I've finally gotten it right. Technical books such as this are works in progress. There have been so many changes in the world of information security since I first wrote the book in 2003 - new tools, new hacks, and even some new testing methodologies - even since the 2nd edition that came out in 2006 - that I knew an update was due. I've also grown and learned a lot over the years in my work performing independent security assessments which has really helped me to fine tune the content of the book and make it into something valuable. In addition to a lot of fixes and tweaks there's plenty of new content on Windows 7, storage systems, Web applications, databases, mobile devices, and more. New tools, new techniques, just what you need for (in Wiley's words) "Making everything easier!".

What's the book about?
It's about using a malicious mindset to test your systems and your IT operations for weaknesses so you can plug the holes before the bad guys exploit them.

Who should read this book?
From IT Directors to system administrators to compliance officers to security managers - basically anyone responsible for information security and privacy in their business or for their customers. There's something in it for everyone. There's a lot of non-technical content outlining the ethical hacking methodology, managing security changes, and so on that managers can benefit from as well as all the right technical details that IT and security specialists need to know to bring out the worst in their systems.

One more thing...it's a shameless self-promotion but it bears mentioning. I was told by my publisher, John Wiley & Sons, that factoring in the number of editions and time on the market, Hacking For Dummies is/has been the top selling book on computer security. I had no idea. Very cool - and I couldn't have done it without those of you who have bought it! Thank you very much.

Now help me maintain my momentum and go buy a copy of the 3rd edition! :-) You won't be disappointed.

One more thing, if you have your own blog or other outlet and would like to get a review copy, please contact me and I'll work with Wiley to get one out to you.
Read More
Posted in ethical hacking, hacking, Kevin's books, Kevin's security content, recommended books | No comments

Thursday, 7 January 2010

My latest security content, Linux-style

Posted on 11:24 by Unknown
Hope your first week of the last decade of the new millennium is going well!

Here's some more new information security content - focusing on Linux security this time around. Enjoy!

Finding password weaknesses in your Linux systems

Hardening Linux with Bastille UNIX

Using BackTrack to check for Linux vulnerabilities

Many thanks to Leah Rosin with SearchEnterpriseLinux.com for getting me on board with these.

You know the drill - as always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, videos, Twitter updates, and more.
Read More
Posted in cool products, Kevin's security content, Linux, passwords, security assessments, security tools | No comments

Great information security quote

Posted on 11:19 by Unknown
This sends a message, huh?:

"All that is necessary for the triumph of evil is that good men do nothing." -Edmund Burke

It's not just applicable to information security - it also applies to the War on Islamic Terrorism...uhum, I mean "Man-Caused Disaster".
Read More
Posted in information security quotes, security leadership, security management, stupid security | No comments

Monday, 4 January 2010

My latest security content

Posted on 06:10 by Unknown
Here's some more new information security content - stuff on network administration, employee monitoring, checklist audits, and more. Enjoy!

How to get - and keep - user support with security

How to get management on board with Web 2.0 security issues

Underlying causes of inconsistent patch management

Are your IT administrators trustworthy?

Monitoring user activity with network analyzers

Priorities for your sound regulatory compliance management policy

Go beyond a checklist audit for real IT security and data protection

Getting your arms around the compliance beast

As always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, videos, Twitter updates, and more.
Read More
Posted in checklist audits, compliance, employee monitoring, government regulations, Kevin's security content, patch management, security policies, selling security, stupid security | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • How you can get developers on board with security starting today
    Some people - including a brilliant colleague of mine - think security is not the job of software developers . In the grand scheme of things...
  • NetScan Tools LE - a must-have for investigators
    Have you ever had a need to run a program and get a relatively small amount of data just to do your job but end up getting caught in the com...
  • "Top Blogs" list & some home security considerations
    I think I may have found the first sign that my blog is growing and gaining some traction. I've made it to the Top 20 Home Security Blog...
  • Wooo...HIPAA audits are coming & the irony of KPMG's involvement
    I've always believed that compliance is a threat to business [hence why I help businesses take the pain out of compliance by addressing ...
  • Great tool for seeking out sensitive info on your network
    One of the greatest risks in business today is the issue of unstructured information scattered about the network waiting to be misused and ...
  • It's hard being human
    Cavett Robert once said something about character that resonates within information security - especially regarding ongoing management and l...
  • Dario Franchitti and I
    As many of you know I'm a motorsports nut -both as a driver and a fan. This provided the influence for my Security On Wheels logo. Well,...
  • The value of partial code scanning, now
    Check out my new piece on the business value of partial code scanning where I outline why it's better to start your source code analysi...
  • Be it in healthcare or infosec, the short term is for losers
    With all the doctor & hospital visits I've gone (and am still going) through with family members in the past few years, I've com...
  • Live from #RSAC: Cloud computing's got some kinks (but you knew that)
    I'm attending the RSA Conference this week and just sat through a panel discussion on cross-jurisdictional issues in the cloud. It was p...

Categories

  • active directory
  • application firewalls
  • APTs
  • aslr
  • atm security
  • audio programs
  • audit logging
  • automated scanner oversights
  • back to basics
  • backups
  • big brother
  • bitlocker
  • budget
  • business case for security
  • business continuity
  • BYOD
  • car hacking
  • careers
  • certifications
  • change management
  • checklist audits
  • cissp
  • clear wireless
  • cloud computing
  • communication
  • compliance
  • computer glitch
  • conferences
  • consulting
  • content filtering
  • cool products
  • cool sites
  • cross-site request forgery
  • cross-site scripting
  • csrf
  • customer no service
  • cybersecurity bill
  • data at rest
  • data breach laws
  • data breaches
  • data centers
  • data destruction
  • data leakage
  • data protection
  • data retention
  • database security
  • degrees
  • desktop management
  • disaster recovery
  • disk imaging
  • disposal
  • dns
  • document security
  • domino
  • DoS attacks
  • drive encryption
  • e-discovery
  • ediscovery
  • employee monitoring
  • encrypting data in transit
  • encryption
  • end point security
  • ethical hacking
  • exchange
  • experience
  • expert witness
  • exploits
  • facebook
  • FERPA
  • file integrity monitoring
  • firewalls
  • forensics
  • full disk encryption
  • global warming
  • goal setting
  • good blogs
  • government intrusion
  • government regulations
  • great quotes
  • hacking
  • hardware
  • hipaa
  • hitech
  • hitech act
  • home security
  • humor
  • identity access management
  • identity theft
  • IIS
  • incident response
  • information classification
  • information security quotes
  • intel
  • intellectual property
  • internal threat
  • java
  • Kevin's books
  • Kevin's interviews
  • Kevin's keynotes
  • kevin's panels
  • kevin's quotes
  • Kevin's security content
  • Kevin's seminars
  • Kevin's videos
  • laptop encryption
  • laptop security
  • legal
  • Linux
  • locking screens
  • low-hanging fruit
  • malware
  • marketing hype
  • message from Kevin
  • messaging security
  • metasploit
  • metrics
  • mobile apps
  • mobile security
  • motivation
  • multi-factor authentication
  • network analysis
  • network complexities
  • network protocols
  • network security
  • networking essentials
  • Novell
  • office
  • online backup
  • online safety
  • open source security
  • owasp
  • p2p
  • passwords
  • patch management
  • patching
  • pci 6.6
  • pci dss
  • PCNAA
  • penetration testing
  • people problems
  • personal responsibility
  • phishing
  • physical security
  • pii
  • podcasts
  • policy enforcement
  • politics
  • presentations
  • privacy
  • quality assurance
  • recommended books
  • recommended magazines
  • recycling
  • remote access security
  • ridiculous password requirements
  • risk analysis
  • risk management
  • rogue insiders
  • ROI
  • RSA 2012
  • running a business
  • saas
  • salary
  • scary stuff
  • sccm
  • sdlc
  • security assessments
  • security audits
  • security awareness
  • security committees
  • security leadership
  • security management
  • security operations
  • security policies
  • security policy
  • security scans
  • security standards
  • security statistics
  • security technologies
  • security testing tools
  • security tools
  • selling security
  • sharepoint
  • small business
  • smartphone security
  • SMBs
  • social media
  • software development
  • source code
  • source code analysis
  • special offer
  • SQL injection
  • sql server
  • ssl
  • storage security
  • student information systems
  • stupid security
  • success
  • telecommuting
  • testimonials
  • thinking long term
  • third-party applications
  • threat modeling
  • time management
  • training
  • twitter
  • uncool products
  • unstructured information
  • unstructured infromation
  • user awareness
  • vendors
  • virtual machine security
  • visibility
  • voip
  • vulnerability assessments
  • web 2.0
  • web application security
  • web browser security
  • web server security
  • webcasts
  • WebInspect
  • whitelisting
  • whitepapers
  • Windows
  • Windows 7
  • windows 8
  • windows 8.1
  • Windows Mobile
  • windows security
  • Windows Vista
  • wireless
  • wireless security
  • zero tolerance

Blog Archive

  • ►  2013 (35)
    • ►  November (3)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  July (3)
    • ►  June (1)
    • ►  May (4)
    • ►  April (4)
    • ►  March (4)
    • ►  February (5)
    • ►  January (5)
  • ►  2012 (77)
    • ►  December (2)
    • ►  November (2)
    • ►  October (4)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (5)
    • ►  March (10)
    • ►  February (14)
    • ►  January (16)
  • ►  2011 (163)
    • ►  December (15)
    • ►  November (11)
    • ►  October (9)
    • ►  September (16)
    • ►  August (13)
    • ►  July (8)
    • ►  June (13)
    • ►  May (18)
    • ►  April (16)
    • ►  March (13)
    • ►  February (13)
    • ►  January (18)
  • ▼  2010 (170)
    • ►  December (10)
    • ►  November (14)
    • ►  October (7)
    • ►  September (27)
    • ►  August (20)
    • ►  July (8)
    • ►  June (15)
    • ►  May (4)
    • ►  April (23)
    • ►  March (21)
    • ►  February (11)
    • ▼  January (10)
      • Webinar on database security this week
      • What are your thoughts on Web hosting / colo provi...
      • My latest information security content
      • Twitter - how about some capacity planning?
      • I'm featured in the new issue of Entrepreneur Maga...
      • Resolutions are for Losers
      • Introducing my new book - Hacking For Dummies, 3rd...
      • My latest security content, Linux-style
      • Great information security quote
      • My latest security content
  • ►  2009 (55)
    • ►  December (5)
    • ►  November (10)
    • ►  October (21)
    • ►  September (19)
Powered by Blogger.

About Me

Unknown
View my complete profile