Tech Support For Dummies

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 28 February 2011

Security talent ≠ security success

Posted on 10:52 by Unknown
Here's one of those great quotes that applies directly to infosec:

“Talent is cheaper than table salt. What separates the talented individual from the successful one is a lot of hard work.” -Stephen King

There are plenty of people who understand security architecture, hacking and related technical issues but few who really get the essence of risk and have taken the necessary steps to make information security work in support of the business.
Read More
Posted in careers, great quotes, information security quotes, personal responsibility, risk analysis, security leadership, security management | No comments

Monday, 21 February 2011

New issue of Security Technology Executive @secinfowatch

Posted on 07:04 by Unknown
The new edition of a very solid and unique magazine on security (both physical and IT) - Security Technology Executive - is now online.

Be sure to check out the column I wrote in this issue entitled "Fighting the Malware Fight All Over Again" on page 21.
Read More
Posted in Kevin's security content, malware, recommended magazines | No comments

Thursday, 17 February 2011

Are you focusing on the infosec basics where it counts?

Posted on 06:47 by Unknown
Here's a good read from @arstechnica on the HBGary story. It's a fascinating story in and of itself. But the oversights related to information security "best practices" is amazing.

What is it going to take to get people to focus on the basics? Seriously, folks...Forget about all the fancy hack attacks and complex exploits for now and fix the low-hanging fruit. It's basic triage - stop the bleeding first. Focus on your highest payoff tasks and work your way down the list.

All things considered, by just focusing on the basics of information security controls and testing alone you can achieve top-notch security, relatively speaking, which is light years ahead of where most organizations are today.
Read More
Posted in back to basics, low-hanging fruit, scary stuff, security leadership, stupid security, thinking long term, vulnerability assessments | No comments

Not surprised by the Wells Fargo ATM outage based on what I see

Posted on 04:37 by Unknown
Here's an interesting story about the widespread Wells Fargo ATM outage that occurred last week. There's speculation around the cause of the outage. Was it a hack? Was the system inadvertently taken down during system upgrades? Who knows...

What I can say is that virtually every ATM I've come across in my work performing internal security assessments in/around the financial industry has been riddled with security holes. I've seen weak OS passwords, missing patches dating back 8+ years (many of which are easily exploitable via Metasploit to boot) open network shares and so on. Not long ago, I came across an ATM controller system (the big system typically running UNIX that controls all the ATMs across the bank) that had a blank password for the root account. How's that for accountability?

Seeing what's going on with ATMs it's no surprise to me that this Wells Fargo outage occurred. I'm not saying a vulnerability was exploited in this situation, but you never know. I am surprised these types of outages don't occur more often. When these types of security holes are present in ATMs, all it takes is a rogue insider with a little bit of technical sense to take everything offline, and more.

Remember if it's got an IP address, anything's fair game.
Read More
Posted in atm security, passwords, patch management, penetration testing, stupid security, vulnerability assessments | No comments

Saturday, 12 February 2011

Windows 7, Windows Phone 7, & Windows Firewall

Posted on 10:19 by Unknown
Be it smartphones or desktops, when it comes to securing Windows you've got to look at both. Here are some new pieces I wrote for SearchEnterpriseDesktop.com that you may be interested in:

Security considerations for Windows Phone 7


Should you use third-party patching tools to keep Windows 7 secure?

Weighing Windows Firewall for enterprise desktop protection
Read More
Posted in firewalls, Kevin's security content, patch management, patching, smartphone security, Windows 7, Windows Mobile, windows security | No comments

Wednesday, 9 February 2011

Leave the phone alone...

Posted on 05:51 by Unknown
You have to watch this video. Seriously, stop what you're doing now and watch this. This issue has a profound affect on you, your family, your friends - everyone around us. It'll make you cry. No matter how good a driver you are and no matter how much you've heard about this topic - everyone needs to see this video. Please pass it along.

Read More
Posted in message from Kevin, personal responsibility, scary stuff | No comments

Is it possible to do more with less?

Posted on 04:21 by Unknown
In this era of limited budgets and "wait and see" leadership you still have to do something to manage IT and information security. I've always had trouble understanding why people can't focus on the basics and solve these problems using solutions already at their disposal. I guess the marketing machine is just doing its job.

Here's a good article about this very thing written by my colleague and publisher Steve Lasky with Atlanta-based Security Technology Executive magazine. Steve's piece reminds us all how we can do more with less if we choose to. If you're struggling to keep the shop running check out this piece I wrote for SearchWinIT.com as well:

How to maintain IT shop efficiency when you're the last man standing

Regardless, keep your chin up...this too shall pass.
Read More
Posted in back to basics, careers, low-hanging fruit, security leadership, security management, time management | No comments

Tuesday, 8 February 2011

Principles are not values

Posted on 05:47 by Unknown
When I started my information security consulting business 10 years ago I believed the words "principle" and "logic" would be a good fit for the way I think and work. The concept and mode of operation has worked out great. I was just reading a quote by Stephen Covey that reminded me of this - and information security leadership in general...he said:

"Principles are not values. A gang of thieves can share values, but they are in violation of the fundamental principles we're talking about. Principles are territory. Values are maps. When we value correct principles, we have truth - a knowledge of things as they are."

Deep...
Read More
Posted in careers, great quotes, information security quotes, security leadership | No comments

Findings from the Fort Hood shooting underscores today's incident response reality

Posted on 04:52 by Unknown
You may have heard about this in the news over the weekend: apparently the Army psychiatrist turned Islamic extremist who killed 13 people at Fort Hood in November 2009 could've been prevented had the FBI and Army been communicating with one another.

Sadly the same poor communication exists in the corporate world. Along the same lines of this incident, based on what I see in my security assessments I can confidently say that any substantial data breach in any given enterprise is not going to be handled properly. There are breakdowns leading up to incidents and failures on the reactive side of the equation. It's information systems complexity intertwined with the human propensity to ignore the obvious and push things off until they HAVE to be addressed just waiting to be exploited.

There are two other takeaways from this that cannot be ignored:
1) failed communications between government agencies always has been a problem and always will be - especially as government grows
2) government - including the police - is incapable of keeping us safe all the time

In both our personal lives and at work it pays to be vigilant.
Read More
Posted in data breach laws, government regulations, incident response, personal responsibility, scary stuff, security leadership, stupid security, thinking long term | No comments

Sunday, 6 February 2011

Lessons on Web security threats and testing

Posted on 16:59 by Unknown
Here are some recent webcasts/podcasts I recorded for SearchSoftwareQuality.com (@SoftwareTestTT) on Web application security:

Security Lesson: Beating Web application security threats

Security Lesson: How to test for common security defects

I feel like I'm just scratching the surface on this topic but, thinking about what's going on out there, many people have yet to realize there's even a problem. Focus on these basics and you're going to eliminate the large majority of Web security risks.

Enjoy...
Read More
Posted in Kevin's security content, penetration testing, threat modeling, vulnerability assessments, web application security, web server security | No comments

Friday, 4 February 2011

I'm quoted in today's Wall Street Journal, p. B9

Posted on 17:14 by Unknown
Joe Mullich, a writer for the @WSJ, has put together some great stories on cybercrime and data breaches in Marketplace (section B) today. My contribution is on smartphone security and it's located on page B9 at the end of the piece titled "A Surge of Smishes - Workers' laxness opens door to smartphone data theft".

Also check out the piece on TigerText (the secret texting app) on page B11. Cool stuff.
Read More
Posted in Kevin's interviews, kevin's quotes, Kevin's security content, mobile security, smartphone security | No comments

Thursday, 3 February 2011

Check out tomorrow's Wall Street Journal @wsj

Posted on 07:54 by Unknown
I'm being featured in a piece on #smartphones and mobile security in tomorrow's Wall Street Journal. More to come soon...
Read More
Posted in Kevin's interviews, mobile security | No comments

Don't just do something, sit there.

Posted on 07:40 by Unknown
Seriously, it's time to kill the #KillSwitch bill that I've written about recently. It's dangerous, it's not what America is about and it's only going to make things worse for our country, our economy and our personal liberty.

Here's some more details along what you can do about it today:
http://www.downsizedc.org/blog/new-initiative-kill-the-kill-switch-bill
Read More
Posted in compliance, government intrusion, government regulations, personal responsibility, scary stuff, stupid security, thinking long term | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • How you can get developers on board with security starting today
    Some people - including a brilliant colleague of mine - think security is not the job of software developers . In the grand scheme of things...
  • NetScan Tools LE - a must-have for investigators
    Have you ever had a need to run a program and get a relatively small amount of data just to do your job but end up getting caught in the com...
  • "Top Blogs" list & some home security considerations
    I think I may have found the first sign that my blog is growing and gaining some traction. I've made it to the Top 20 Home Security Blog...
  • Wooo...HIPAA audits are coming & the irony of KPMG's involvement
    I've always believed that compliance is a threat to business [hence why I help businesses take the pain out of compliance by addressing ...
  • Great tool for seeking out sensitive info on your network
    One of the greatest risks in business today is the issue of unstructured information scattered about the network waiting to be misused and ...
  • It's hard being human
    Cavett Robert once said something about character that resonates within information security - especially regarding ongoing management and l...
  • Dario Franchitti and I
    As many of you know I'm a motorsports nut -both as a driver and a fan. This provided the influence for my Security On Wheels logo. Well,...
  • The value of partial code scanning, now
    Check out my new piece on the business value of partial code scanning where I outline why it's better to start your source code analysi...
  • Be it in healthcare or infosec, the short term is for losers
    With all the doctor & hospital visits I've gone (and am still going) through with family members in the past few years, I've com...
  • Live from #RSAC: Cloud computing's got some kinks (but you knew that)
    I'm attending the RSA Conference this week and just sat through a panel discussion on cross-jurisdictional issues in the cloud. It was p...

Categories

  • active directory
  • application firewalls
  • APTs
  • aslr
  • atm security
  • audio programs
  • audit logging
  • automated scanner oversights
  • back to basics
  • backups
  • big brother
  • bitlocker
  • budget
  • business case for security
  • business continuity
  • BYOD
  • car hacking
  • careers
  • certifications
  • change management
  • checklist audits
  • cissp
  • clear wireless
  • cloud computing
  • communication
  • compliance
  • computer glitch
  • conferences
  • consulting
  • content filtering
  • cool products
  • cool sites
  • cross-site request forgery
  • cross-site scripting
  • csrf
  • customer no service
  • cybersecurity bill
  • data at rest
  • data breach laws
  • data breaches
  • data centers
  • data destruction
  • data leakage
  • data protection
  • data retention
  • database security
  • degrees
  • desktop management
  • disaster recovery
  • disk imaging
  • disposal
  • dns
  • document security
  • domino
  • DoS attacks
  • drive encryption
  • e-discovery
  • ediscovery
  • employee monitoring
  • encrypting data in transit
  • encryption
  • end point security
  • ethical hacking
  • exchange
  • experience
  • expert witness
  • exploits
  • facebook
  • FERPA
  • file integrity monitoring
  • firewalls
  • forensics
  • full disk encryption
  • global warming
  • goal setting
  • good blogs
  • government intrusion
  • government regulations
  • great quotes
  • hacking
  • hardware
  • hipaa
  • hitech
  • hitech act
  • home security
  • humor
  • identity access management
  • identity theft
  • IIS
  • incident response
  • information classification
  • information security quotes
  • intel
  • intellectual property
  • internal threat
  • java
  • Kevin's books
  • Kevin's interviews
  • Kevin's keynotes
  • kevin's panels
  • kevin's quotes
  • Kevin's security content
  • Kevin's seminars
  • Kevin's videos
  • laptop encryption
  • laptop security
  • legal
  • Linux
  • locking screens
  • low-hanging fruit
  • malware
  • marketing hype
  • message from Kevin
  • messaging security
  • metasploit
  • metrics
  • mobile apps
  • mobile security
  • motivation
  • multi-factor authentication
  • network analysis
  • network complexities
  • network protocols
  • network security
  • networking essentials
  • Novell
  • office
  • online backup
  • online safety
  • open source security
  • owasp
  • p2p
  • passwords
  • patch management
  • patching
  • pci 6.6
  • pci dss
  • PCNAA
  • penetration testing
  • people problems
  • personal responsibility
  • phishing
  • physical security
  • pii
  • podcasts
  • policy enforcement
  • politics
  • presentations
  • privacy
  • quality assurance
  • recommended books
  • recommended magazines
  • recycling
  • remote access security
  • ridiculous password requirements
  • risk analysis
  • risk management
  • rogue insiders
  • ROI
  • RSA 2012
  • running a business
  • saas
  • salary
  • scary stuff
  • sccm
  • sdlc
  • security assessments
  • security audits
  • security awareness
  • security committees
  • security leadership
  • security management
  • security operations
  • security policies
  • security policy
  • security scans
  • security standards
  • security statistics
  • security technologies
  • security testing tools
  • security tools
  • selling security
  • sharepoint
  • small business
  • smartphone security
  • SMBs
  • social media
  • software development
  • source code
  • source code analysis
  • special offer
  • SQL injection
  • sql server
  • ssl
  • storage security
  • student information systems
  • stupid security
  • success
  • telecommuting
  • testimonials
  • thinking long term
  • third-party applications
  • threat modeling
  • time management
  • training
  • twitter
  • uncool products
  • unstructured information
  • unstructured infromation
  • user awareness
  • vendors
  • virtual machine security
  • visibility
  • voip
  • vulnerability assessments
  • web 2.0
  • web application security
  • web browser security
  • web server security
  • webcasts
  • WebInspect
  • whitelisting
  • whitepapers
  • Windows
  • Windows 7
  • windows 8
  • windows 8.1
  • Windows Mobile
  • windows security
  • Windows Vista
  • wireless
  • wireless security
  • zero tolerance

Blog Archive

  • ►  2013 (35)
    • ►  November (3)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  July (3)
    • ►  June (1)
    • ►  May (4)
    • ►  April (4)
    • ►  March (4)
    • ►  February (5)
    • ►  January (5)
  • ►  2012 (77)
    • ►  December (2)
    • ►  November (2)
    • ►  October (4)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (5)
    • ►  March (10)
    • ►  February (14)
    • ►  January (16)
  • ▼  2011 (163)
    • ►  December (15)
    • ►  November (11)
    • ►  October (9)
    • ►  September (16)
    • ►  August (13)
    • ►  July (8)
    • ►  June (13)
    • ►  May (18)
    • ►  April (16)
    • ►  March (13)
    • ▼  February (13)
      • Security talent ≠ security success
      • New issue of Security Technology Executive @secinf...
      • Are you focusing on the infosec basics where it co...
      • Not surprised by the Wells Fargo ATM outage based ...
      • Windows 7, Windows Phone 7, & Windows Firewall
      • Leave the phone alone...
      • Is it possible to do more with less?
      • Principles are not values
      • Findings from the Fort Hood shooting underscores t...
      • Lessons on Web security threats and testing
      • I'm quoted in today's Wall Street Journal, p. B9
      • Check out tomorrow's Wall Street Journal @wsj
      • Don't just do something, sit there.
    • ►  January (18)
  • ►  2010 (170)
    • ►  December (10)
    • ►  November (14)
    • ►  October (7)
    • ►  September (27)
    • ►  August (20)
    • ►  July (8)
    • ►  June (15)
    • ►  May (4)
    • ►  April (23)
    • ►  March (21)
    • ►  February (11)
    • ►  January (10)
  • ►  2009 (55)
    • ►  December (5)
    • ►  November (10)
    • ►  October (21)
    • ►  September (19)
Powered by Blogger.

About Me

Unknown
View my complete profile