Tech Support For Dummies

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 29 October 2010

The business side of Web security (you can't afford to ignore)

Posted on 04:47 by Unknown
Here's a new piece I wrote about the *other* aspects of Web security beyond the bits and bytes...Don't let this stuff catch you off guard.

Preventing phishing attacks is not just a technical issue
Read More
Posted in Kevin's security content, phishing, security committees, security leadership, security operations, web application security | No comments

Wednesday, 27 October 2010

Talk about old school...

Posted on 13:33 by Unknown
I recently came across a Web site I was creating an account for which stated the following for its login requirements:

Your user name & password must consist of letters in all caps 4-7 characters in length.

Too funny...
Read More
Posted in humor, ridiculous password requirements, stupid security, web application security | No comments

Monday, 18 October 2010

AppDetectivePro v7 worth checking out

Posted on 17:06 by Unknown
Have you checked out Application Security's (somewhat) new AppDetectivePro version 7? Have you even heard of AppDetectivePro? If not, it needs to be on your radar. It's a powerful database vulnerability scanner that can perform both unauthenticated penetration tests as well as authenticated audits of SQL Server, Oracle, MySQL, DB2, Notes/Domino and Sybase (wow) systems. A screenshot of a penetration test of an Oracle 11g-based system is shown below:
























AppDetective is a tool that I've relied on for years to help with database security assessments. The price per database instance is pricey but it's worth it. I've found that the results are very similar when running it on similar systems so one scan per platform may be enough to get by with as long as you implement the same changes on like systems across the board.

Probably the biggest improvement with AppDetective Pro version 7 is the User Rights Review shown below:
























User Rights Review allows you to run reports on effective role and user permissions for a specific database. That's big in today's world of big government and big regulation. I'm not surprised at its utility, however, since reporting is one of AppDetectivePro's strong suits - pleasing compliance managers, auditors, and regulators from sea to shining sea for years.

The bad news (not necessarily related to the new version 7) is that I recently lost about 5 hours of my life troubleshooting a problem with AppDetectivePro that should've been readily-accessible in the documentation or online knowledgebase. In essence, a SQL Server system I was testing was running in shared memory mode and had TCP/IP disabled. Running the tool on the same SQL Server box still yielded a big fat nothing until a level 2 support person helped me get to the bottom of the problem.

Overall, AppDetectivePro is still the most comprehensive and recognized database vulnerability scanner. It's definitely worth checking out. As for SQL Server 2008 R2 support (a biggie in my book) I checked with the folks at Application Security about a month ago, and according to their site today, there's still no support for it but I suspect that'll come soon as more clients demand it. Furthermore the name of the product doesn't really reflect what it does (databases not apps, although it used to perform basic Web app scans)...but, hey, now you know, right?
Read More
Posted in cool products, database security, penetration testing, security testing tools, vulnerability assessments | No comments

Is this quote one of the contributing factors to lax infosec?

Posted on 05:12 by Unknown
Novelist Robert Heinlein once said "In the absence of clearly-defined goals, we become strangely loyal to performing daily trivia until ultimately we become enslaved by it."

I suspect this is a large contributing factor to the lack of information security - and subsequent data breaches - in business today.

Feel like you need a jump start on goal setting? Check out this piece I wrote on the subject:

Eight steps to accomplishing your IT career goals
Read More
Posted in goal setting, great quotes, incident response, information security quotes, personal responsibility, security leadership | No comments

Monday, 11 October 2010

Got compliance? Here are some tips for moving ahead.

Posted on 05:39 by Unknown
Tired of "compliance"? Me too. But, it's still one of those necessary (arguably sometimes unnecessary) evils we must deal with in business today.

Here are some new pieces I've written for the fine folks at SearchCompliance.com that will hopefully be of some benefit to you and your business.:

Priorities for your sound regulatory compliance management policy


Put compliance management back into server virtualization

Achieving compliance is about more than secure data encryption

What compliance professionals shouldn't do after data breaches

Can mobile device security include risk management and compliance?

....and finally, any discussion on compliance wouldn't be complete without talking about THE approach we need to take to any security/compliance project: risk management. Here's a bit a wrote about metrics you can use ensure your efforts aren't in vain.

Using metrics to enhance information risk management

For further reading on all the fun things about compliance check out my compliance resources page.
Read More
Posted in compliance, encryption, government regulations, incident response, metrics, risk analysis, security management, security policies, virtual machine security | No comments

Wednesday, 6 October 2010

911, what's your emergency?

Posted on 10:16 by Unknown
There's a saying when seconds count the police are only minutes away. Maybe yes, maybe no - and like I just experienced, sometimes they may not care at all. Let me explain...

Have you ever been driving down the road and witnessed someone driving completely erratically to the point where you think "WOW, that person is going to cause a wreck, soon." Well, I was out for a leisurely drive in a nearby town and was unfortunately the near-recipient of such a wreck by a gotta-have-it-now-the-world-revolves-around-me-probably-hopped-up-on-meth-idiotic driver....not once but twice! Yep, within a matter of about 4 minutes I nearly got nailed by this person TWO times.

It appeared the older lady (mid to late 60s) in a ~2005 Buick Regal license plate number (ah, nevermind) was either intoxicated OR on a suicide mission. I thought to myself, I've got to call the police and tell them about this woman....I survived her but that doesn't mean everyone else will.

So I called 911 - presumably the City of Cartersville, GA Police 911 center since I was driving right by their headquarters building when I called. I gave them some very basic info, and started to fill the operator in on some more details they probably could've used. Instead, the 911 operator I spoke with said thanks, cut me off, and went on her merry way. Yep, I heard a click....I said uh, eh, ah, oh...and there was nothing. Phone line was dead. Our government at work! I know 911 call centers have to be succinct and not tie up their...and sure, this wasn't an emergency, yet. But come on.

Keep this in mind everywhere you are - in the car, at home, and at work - for at the end of the day the police have no obligation to protect us (really); therefore we must fend for ourselves.
Read More
Posted in personal responsibility, physical security, policy enforcement, scary stuff, stupid security | No comments

Monday, 4 October 2010

Beware of the oversights w/default policies in Web vuln scanners

Posted on 11:15 by Unknown
I just ran some Web vulnerability scans against an app I'm testing using a couple of default/benign scan policies. Nothing big turned up. I re-ran the scan using a full scan policy that checks for everything and the new MS10-070 ASP.NET padding oracle vulnerability reared its ugly head...BIG difference in the outcome.

Keep this in mind when checking for Web security flaws with your automated scanners and never ever completely rely on their results. You can't live without them but they're only ~50% of the solution.
Read More
Posted in automated scanner oversights, penetration testing, vulnerability assessments, web application security | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • How you can get developers on board with security starting today
    Some people - including a brilliant colleague of mine - think security is not the job of software developers . In the grand scheme of things...
  • NetScan Tools LE - a must-have for investigators
    Have you ever had a need to run a program and get a relatively small amount of data just to do your job but end up getting caught in the com...
  • "Top Blogs" list & some home security considerations
    I think I may have found the first sign that my blog is growing and gaining some traction. I've made it to the Top 20 Home Security Blog...
  • Wooo...HIPAA audits are coming & the irony of KPMG's involvement
    I've always believed that compliance is a threat to business [hence why I help businesses take the pain out of compliance by addressing ...
  • Great tool for seeking out sensitive info on your network
    One of the greatest risks in business today is the issue of unstructured information scattered about the network waiting to be misused and ...
  • It's hard being human
    Cavett Robert once said something about character that resonates within information security - especially regarding ongoing management and l...
  • Dario Franchitti and I
    As many of you know I'm a motorsports nut -both as a driver and a fan. This provided the influence for my Security On Wheels logo. Well,...
  • The value of partial code scanning, now
    Check out my new piece on the business value of partial code scanning where I outline why it's better to start your source code analysi...
  • Be it in healthcare or infosec, the short term is for losers
    With all the doctor & hospital visits I've gone (and am still going) through with family members in the past few years, I've com...
  • Live from #RSAC: Cloud computing's got some kinks (but you knew that)
    I'm attending the RSA Conference this week and just sat through a panel discussion on cross-jurisdictional issues in the cloud. It was p...

Categories

  • active directory
  • application firewalls
  • APTs
  • aslr
  • atm security
  • audio programs
  • audit logging
  • automated scanner oversights
  • back to basics
  • backups
  • big brother
  • bitlocker
  • budget
  • business case for security
  • business continuity
  • BYOD
  • car hacking
  • careers
  • certifications
  • change management
  • checklist audits
  • cissp
  • clear wireless
  • cloud computing
  • communication
  • compliance
  • computer glitch
  • conferences
  • consulting
  • content filtering
  • cool products
  • cool sites
  • cross-site request forgery
  • cross-site scripting
  • csrf
  • customer no service
  • cybersecurity bill
  • data at rest
  • data breach laws
  • data breaches
  • data centers
  • data destruction
  • data leakage
  • data protection
  • data retention
  • database security
  • degrees
  • desktop management
  • disaster recovery
  • disk imaging
  • disposal
  • dns
  • document security
  • domino
  • DoS attacks
  • drive encryption
  • e-discovery
  • ediscovery
  • employee monitoring
  • encrypting data in transit
  • encryption
  • end point security
  • ethical hacking
  • exchange
  • experience
  • expert witness
  • exploits
  • facebook
  • FERPA
  • file integrity monitoring
  • firewalls
  • forensics
  • full disk encryption
  • global warming
  • goal setting
  • good blogs
  • government intrusion
  • government regulations
  • great quotes
  • hacking
  • hardware
  • hipaa
  • hitech
  • hitech act
  • home security
  • humor
  • identity access management
  • identity theft
  • IIS
  • incident response
  • information classification
  • information security quotes
  • intel
  • intellectual property
  • internal threat
  • java
  • Kevin's books
  • Kevin's interviews
  • Kevin's keynotes
  • kevin's panels
  • kevin's quotes
  • Kevin's security content
  • Kevin's seminars
  • Kevin's videos
  • laptop encryption
  • laptop security
  • legal
  • Linux
  • locking screens
  • low-hanging fruit
  • malware
  • marketing hype
  • message from Kevin
  • messaging security
  • metasploit
  • metrics
  • mobile apps
  • mobile security
  • motivation
  • multi-factor authentication
  • network analysis
  • network complexities
  • network protocols
  • network security
  • networking essentials
  • Novell
  • office
  • online backup
  • online safety
  • open source security
  • owasp
  • p2p
  • passwords
  • patch management
  • patching
  • pci 6.6
  • pci dss
  • PCNAA
  • penetration testing
  • people problems
  • personal responsibility
  • phishing
  • physical security
  • pii
  • podcasts
  • policy enforcement
  • politics
  • presentations
  • privacy
  • quality assurance
  • recommended books
  • recommended magazines
  • recycling
  • remote access security
  • ridiculous password requirements
  • risk analysis
  • risk management
  • rogue insiders
  • ROI
  • RSA 2012
  • running a business
  • saas
  • salary
  • scary stuff
  • sccm
  • sdlc
  • security assessments
  • security audits
  • security awareness
  • security committees
  • security leadership
  • security management
  • security operations
  • security policies
  • security policy
  • security scans
  • security standards
  • security statistics
  • security technologies
  • security testing tools
  • security tools
  • selling security
  • sharepoint
  • small business
  • smartphone security
  • SMBs
  • social media
  • software development
  • source code
  • source code analysis
  • special offer
  • SQL injection
  • sql server
  • ssl
  • storage security
  • student information systems
  • stupid security
  • success
  • telecommuting
  • testimonials
  • thinking long term
  • third-party applications
  • threat modeling
  • time management
  • training
  • twitter
  • uncool products
  • unstructured information
  • unstructured infromation
  • user awareness
  • vendors
  • virtual machine security
  • visibility
  • voip
  • vulnerability assessments
  • web 2.0
  • web application security
  • web browser security
  • web server security
  • webcasts
  • WebInspect
  • whitelisting
  • whitepapers
  • Windows
  • Windows 7
  • windows 8
  • windows 8.1
  • Windows Mobile
  • windows security
  • Windows Vista
  • wireless
  • wireless security
  • zero tolerance

Blog Archive

  • ►  2013 (35)
    • ►  November (3)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  July (3)
    • ►  June (1)
    • ►  May (4)
    • ►  April (4)
    • ►  March (4)
    • ►  February (5)
    • ►  January (5)
  • ►  2012 (77)
    • ►  December (2)
    • ►  November (2)
    • ►  October (4)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (5)
    • ►  March (10)
    • ►  February (14)
    • ►  January (16)
  • ►  2011 (163)
    • ►  December (15)
    • ►  November (11)
    • ►  October (9)
    • ►  September (16)
    • ►  August (13)
    • ►  July (8)
    • ►  June (13)
    • ►  May (18)
    • ►  April (16)
    • ►  March (13)
    • ►  February (13)
    • ►  January (18)
  • ▼  2010 (170)
    • ►  December (10)
    • ►  November (14)
    • ▼  October (7)
      • The business side of Web security (you can't affor...
      • Talk about old school...
      • AppDetectivePro v7 worth checking out
      • Is this quote one of the contributing factors to l...
      • Got compliance? Here are some tips for moving ahead.
      • 911, what's your emergency?
      • Beware of the oversights w/default policies in Web...
    • ►  September (27)
    • ►  August (20)
    • ►  July (8)
    • ►  June (15)
    • ►  May (4)
    • ►  April (23)
    • ►  March (21)
    • ►  February (11)
    • ►  January (10)
  • ►  2009 (55)
    • ►  December (5)
    • ►  November (10)
    • ►  October (21)
    • ►  September (19)
Powered by Blogger.

About Me

Unknown
View my complete profile