Tech Support For Dummies

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 24 February 2010

Great information security quote

Posted on 06:14 by Unknown
"I am more afraid of an army of 100 sheep led by a lion than an army of 100 lions led by a sheep." -Charles Talleyrand

Applies nicely to the management of information security and amazingly well to our government "leaders" today.
Read More
Posted in great quotes, information security quotes, security leadership | No comments

Tuesday, 23 February 2010

P2P risks, all over again

Posted on 18:34 by Unknown
It's sad when our government has to warn businesses about their own P2P network security flaws.

I wrote about the security considerations with P2P applications seemingly a lifetime ago (2003) for TechTarget in a piece titled Are P2P applications worth the risk?

Around this same time I served as a P2P expert on a panel discussion at American Intellectual Property Law Association's conference in Atlanta where we discussed these same issues.

Nothing has changed with the threats and the vulnerabilities of P2P applications...nothing. OK, it can be argued that things have gotten worse. Yet we continue to ignore what's going on at the desktop and at the protocol level. Interesting insight into how far we've come with information security since then.
Read More
Posted in expert witness, network analysis, network protocols, p2p, stupid security | No comments

Monday, 22 February 2010

Failure is always an option

Posted on 06:31 by Unknown
Michael Eisner once said "Succeeding is not really a life experience that does much good. Failing is a much more sobering and enlightening experience."

This is something we often take for granted...and something that's facilitated by our society of not wanting people (especially our kids) to fail.

I wouldn't trade my failures in life for anything...they've gotten me to where I am today. Failure's always an option and not something to be ashamed of as long as you embrace it and learn from it.
Read More
Posted in careers, great quotes, information security quotes, security leadership, success | No comments

Wednesday, 17 February 2010

What's your certification worth? Nothing.

Posted on 03:33 by Unknown
According to Global Knowledge (you know, the training/certification folks), IT and security certifications are worth tens of thousands of dollars and, in some cases, over $100,000.

Man oh man if it were only that easy to jump in and make that kind of money - and be able to sustain it. I say that certifications such as CISSP, ITIL, or PMP are worth absolutely nothing unless you make it so. What you earn is up to you - your qualities and the value you bring to the table - not just a simple certification.

Here are some pieces I've written about what it takes to meet and exceed these certification "value" levels. It's easier than you think.
http://securityonwheels.blogspot.com/search/label/certifications
http://www.principlelogic.com/careers.html

If you're just getting started down this path or you want to learn more about getting ahead in IT and information security in 2010, then use the discount code 'CertWorth' for 50 percent off the following Security On Wheels audio programs through the end of February:
  • Certifications, Degrees, or Experience - What's Best for Your Security Career? (MP3 format - run time: 24:35)
  • Getting Started in Security (MP3 format - run time: 49:57)
Read More
Posted in audio programs, careers, certifications, special offer | No comments

Sunday, 14 February 2010

Great tool for seeking out sensitive info on your network

Posted on 18:22 by Unknown
One of the greatest risks in business today is the issue of unstructured information scattered about the network waiting to be misused and abused by rogue insiders and other outsiders that have gained "internal" access.

Reality has shown us that we absolutely cannot protect what we don't acknowledge. The best way to minimize this risk is to search your network far and wide for PII and other sensitive business information you can't afford to have exploited so you'll know which controls you need to put in place to keep it safe. I've done this with basic text search tools such as the one built right into Windows Explorer. Some enterprise solutions to this have come (and gone) in the name of data classification, storage management, and e-discovery tools.

But there's a tool I recently came across that's piqued my interest called Identity Finder shown in the screenshot below:


















Identity Finder has both a standalone and an enterprise version that will search inside many of the common file types and, as you can see in the figure above, seek out credit card numbers, passwords, SSNs, bank account numbers, and more. It's amazing what it will dig up on any given system...reason enough to make you at least want to encrypt your laptop hard drives.

I haven't been real pleased with the overall performance of the tool and the consulting license for the enterprise edition is well out of my price range given all the other costs associated with performing a reasonable internal vulnerability assessment. But overall Identity Finder is definitely worth checking out - especially if you're trying to make the case for unstructured information and identity theft risks or you're trying to take your information classification, compliance, and risk management initiatives to a new level.
Read More
Posted in cool products, identity theft, storage security, unstructured infromation | No comments

Friday, 5 February 2010

My latest information security content

Posted on 11:30 by Unknown
Here are my latest information security articles covering policies, internal threats and employee monitoring, and (when all else, fails) incident response. Enjoy!

Security policy oversights and mistakes we keep making

The real deal with internal security threats

Monitoring user activity with network analyzers

Lack of incident response plan leaves hole in compliance strategy

Incident response – the often overlooked component of business continuity

As always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, whitepapers, podcasts, webcasts, videos, Twitter updates, and more.
Read More
Posted in business continuity, incident response, internal threat, rogue insiders, security policies, stupid security | No comments

My new trade rag column

Posted on 07:42 by Unknown
I've got a new monthly column in Security Technology Executive magazine called Get with IT you may want to check out. It's a real gem of a magazine!
Read More
Posted in good blogs, recommended magazines | No comments

Looking past Layer 7 - Web security is more than the app

Posted on 07:18 by Unknown
Here's a bit I wrote on why we need to look deeper than the application when testing our Web security:

Looking past Layer 7

...it's the little, often overlooked, things that'll get you.
Read More
Posted in penetration testing, web application security, web server security | No comments

Tuesday, 2 February 2010

What part of No Truck Crossing do you not understand?

Posted on 05:15 by Unknown
Check out this wild video of a train crash yesterday. It's a great example of the fact that just because you have a policy (i.e. the no truck crossing sign) doesn't mean that people will abide by (i.e. the dummy driver who probably thought "Aw, I can make this."). Some people just believe that they are exempt from certain things.

Keep this in mind for your information security matters...you can't save people from themselves all the time (like in this case) but you've got to set people up for success whenever you can.
Read More
Posted in policy enforcement, security awareness, security policy, stupid security | No comments

Monday, 1 February 2010

Deep thought of the day

Posted on 11:23 by Unknown
All we have are our knowledge and our time and we don’t have a grip on managing our day-to-day tasks and projects we’ll let both go to waste and drive ourselves crazy. Get to know the basics of time management soon. This knowledge will do wonders for your career.
Read More
Posted in careers, goal setting, time management | No comments

Relying on users to wipe out wimpy passwords??

Posted on 07:58 by Unknown
I just came across this Dark Reading bit by Adrian Lane on wiping out wimpy passwords. Adrian says that user training is needed so people know how to create strong passwords. I'm not picking on you Adrian however this has become a downright ridiculous approach, one that's been proven time and again not to work.

My take is if you have to set your users up for success and, therefore, have to MAKE them create strong passphrases. It's as simple as enabling minimum password complexity policies in the OS and building in strong passphrase requirements within Web applications so that they don't have the option to take the path of least resistance.

Just like anti-lock brake systems in automobiles, circuit breakers in home electrical panels, and seat belt requirements on airplanes, we have to build in security controls that set our users up for success. Period. Unless and until we do, we're going to continue having the same old ridiculous password issues we've always had.
Read More
Posted in passwords, ridiculous password requirements, security awareness, stupid security | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • How you can get developers on board with security starting today
    Some people - including a brilliant colleague of mine - think security is not the job of software developers . In the grand scheme of things...
  • NetScan Tools LE - a must-have for investigators
    Have you ever had a need to run a program and get a relatively small amount of data just to do your job but end up getting caught in the com...
  • "Top Blogs" list & some home security considerations
    I think I may have found the first sign that my blog is growing and gaining some traction. I've made it to the Top 20 Home Security Blog...
  • Wooo...HIPAA audits are coming & the irony of KPMG's involvement
    I've always believed that compliance is a threat to business [hence why I help businesses take the pain out of compliance by addressing ...
  • Great tool for seeking out sensitive info on your network
    One of the greatest risks in business today is the issue of unstructured information scattered about the network waiting to be misused and ...
  • It's hard being human
    Cavett Robert once said something about character that resonates within information security - especially regarding ongoing management and l...
  • Dario Franchitti and I
    As many of you know I'm a motorsports nut -both as a driver and a fan. This provided the influence for my Security On Wheels logo. Well,...
  • The value of partial code scanning, now
    Check out my new piece on the business value of partial code scanning where I outline why it's better to start your source code analysi...
  • Be it in healthcare or infosec, the short term is for losers
    With all the doctor & hospital visits I've gone (and am still going) through with family members in the past few years, I've com...
  • Live from #RSAC: Cloud computing's got some kinks (but you knew that)
    I'm attending the RSA Conference this week and just sat through a panel discussion on cross-jurisdictional issues in the cloud. It was p...

Categories

  • active directory
  • application firewalls
  • APTs
  • aslr
  • atm security
  • audio programs
  • audit logging
  • automated scanner oversights
  • back to basics
  • backups
  • big brother
  • bitlocker
  • budget
  • business case for security
  • business continuity
  • BYOD
  • car hacking
  • careers
  • certifications
  • change management
  • checklist audits
  • cissp
  • clear wireless
  • cloud computing
  • communication
  • compliance
  • computer glitch
  • conferences
  • consulting
  • content filtering
  • cool products
  • cool sites
  • cross-site request forgery
  • cross-site scripting
  • csrf
  • customer no service
  • cybersecurity bill
  • data at rest
  • data breach laws
  • data breaches
  • data centers
  • data destruction
  • data leakage
  • data protection
  • data retention
  • database security
  • degrees
  • desktop management
  • disaster recovery
  • disk imaging
  • disposal
  • dns
  • document security
  • domino
  • DoS attacks
  • drive encryption
  • e-discovery
  • ediscovery
  • employee monitoring
  • encrypting data in transit
  • encryption
  • end point security
  • ethical hacking
  • exchange
  • experience
  • expert witness
  • exploits
  • facebook
  • FERPA
  • file integrity monitoring
  • firewalls
  • forensics
  • full disk encryption
  • global warming
  • goal setting
  • good blogs
  • government intrusion
  • government regulations
  • great quotes
  • hacking
  • hardware
  • hipaa
  • hitech
  • hitech act
  • home security
  • humor
  • identity access management
  • identity theft
  • IIS
  • incident response
  • information classification
  • information security quotes
  • intel
  • intellectual property
  • internal threat
  • java
  • Kevin's books
  • Kevin's interviews
  • Kevin's keynotes
  • kevin's panels
  • kevin's quotes
  • Kevin's security content
  • Kevin's seminars
  • Kevin's videos
  • laptop encryption
  • laptop security
  • legal
  • Linux
  • locking screens
  • low-hanging fruit
  • malware
  • marketing hype
  • message from Kevin
  • messaging security
  • metasploit
  • metrics
  • mobile apps
  • mobile security
  • motivation
  • multi-factor authentication
  • network analysis
  • network complexities
  • network protocols
  • network security
  • networking essentials
  • Novell
  • office
  • online backup
  • online safety
  • open source security
  • owasp
  • p2p
  • passwords
  • patch management
  • patching
  • pci 6.6
  • pci dss
  • PCNAA
  • penetration testing
  • people problems
  • personal responsibility
  • phishing
  • physical security
  • pii
  • podcasts
  • policy enforcement
  • politics
  • presentations
  • privacy
  • quality assurance
  • recommended books
  • recommended magazines
  • recycling
  • remote access security
  • ridiculous password requirements
  • risk analysis
  • risk management
  • rogue insiders
  • ROI
  • RSA 2012
  • running a business
  • saas
  • salary
  • scary stuff
  • sccm
  • sdlc
  • security assessments
  • security audits
  • security awareness
  • security committees
  • security leadership
  • security management
  • security operations
  • security policies
  • security policy
  • security scans
  • security standards
  • security statistics
  • security technologies
  • security testing tools
  • security tools
  • selling security
  • sharepoint
  • small business
  • smartphone security
  • SMBs
  • social media
  • software development
  • source code
  • source code analysis
  • special offer
  • SQL injection
  • sql server
  • ssl
  • storage security
  • student information systems
  • stupid security
  • success
  • telecommuting
  • testimonials
  • thinking long term
  • third-party applications
  • threat modeling
  • time management
  • training
  • twitter
  • uncool products
  • unstructured information
  • unstructured infromation
  • user awareness
  • vendors
  • virtual machine security
  • visibility
  • voip
  • vulnerability assessments
  • web 2.0
  • web application security
  • web browser security
  • web server security
  • webcasts
  • WebInspect
  • whitelisting
  • whitepapers
  • Windows
  • Windows 7
  • windows 8
  • windows 8.1
  • Windows Mobile
  • windows security
  • Windows Vista
  • wireless
  • wireless security
  • zero tolerance

Blog Archive

  • ►  2013 (35)
    • ►  November (3)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  July (3)
    • ►  June (1)
    • ►  May (4)
    • ►  April (4)
    • ►  March (4)
    • ►  February (5)
    • ►  January (5)
  • ►  2012 (77)
    • ►  December (2)
    • ►  November (2)
    • ►  October (4)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (5)
    • ►  March (10)
    • ►  February (14)
    • ►  January (16)
  • ►  2011 (163)
    • ►  December (15)
    • ►  November (11)
    • ►  October (9)
    • ►  September (16)
    • ►  August (13)
    • ►  July (8)
    • ►  June (13)
    • ►  May (18)
    • ►  April (16)
    • ►  March (13)
    • ►  February (13)
    • ►  January (18)
  • ▼  2010 (170)
    • ►  December (10)
    • ►  November (14)
    • ►  October (7)
    • ►  September (27)
    • ►  August (20)
    • ►  July (8)
    • ►  June (15)
    • ►  May (4)
    • ►  April (23)
    • ►  March (21)
    • ▼  February (11)
      • Great information security quote
      • P2P risks, all over again
      • Failure is always an option
      • What's your certification worth? Nothing.
      • Great tool for seeking out sensitive info on your ...
      • My latest information security content
      • My new trade rag column
      • Looking past Layer 7 - Web security is more than t...
      • What part of No Truck Crossing do you not understand?
      • Deep thought of the day
      • Relying on users to wipe out wimpy passwords??
    • ►  January (10)
  • ►  2009 (55)
    • ►  December (5)
    • ►  November (10)
    • ►  October (21)
    • ►  September (19)
Powered by Blogger.

About Me

Unknown
View my complete profile