Tech Support For Dummies

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 29 April 2011

Nikon Image Authentication vulnerability

Posted on 13:57 by Unknown
The fine folks at @Elcomsoft have discovered yet another security flaw in digital cameras. First it was Canon. This time it's Nikon - specifically Nikon's Image Authentication Software.

Elcomsoft researchers found that the way the secure image signing key is being handled in the camera is flawed. This allowed them to extract the original signing key and then produce manipulated images that appear to be legit. I could see this being a huge deal in computer forensics and expert witness work.
Read More
Posted in encryption, expert witness, forensics, passwords, stupid security | No comments

Thursday, 28 April 2011

The mobile device free-for-all dilemma

Posted on 11:16 by Unknown
From @ECIOForum, can you envision enterprises giving workers any desktop or mobile device they want to do their jobs?

I think an important follow-up question is: does it really matter?

People are going to do what they're going to do. Those of us in IT and infosec can scream No, No, No this or that mobile devices on the network at the top of our lungs; until eternity...But you know what? People are going to use them anyway. It's all a matter of how you set your networ, your users and your business up for success and deal with it on the back end.
Read More
Posted in mobile security, policy enforcement, politics, security policies | No comments

Wednesday, 27 April 2011

Novell, Utah and the Libertarian Party

Posted on 12:36 by Unknown
Some new news out today was about Novell completing its sale to Attachmate. Wow, the end of an era...

Novell really does have a special place in my heart - NetWare was the first network operating system I learned, way back in the version 2.15c days. Anyone remember those? Then I moved on to v2.2, 3.12, 4.0 and then 4.1. I obtained my first IT certification - the CNE - that was all about NetWare. I even wrote/sold my own patch management application for NetWare before patch management was cool.

Another great thing about Novell was their BrainShare conference. I see that they've moved it from March to October; glad I got my skiing in when I did! Going to BrainShare every year I not only got to know NetWare like the back of my hand but I also discovered the beauty of Utah - in particular its microbreweries and its snow skiing. Absolutely lovely.

To my final point, I was having lunch with a close friend recently who shared my Novell bigotry back in the day and shares my love for limited government right now. We were talking politics and about how the Tea Party mindset consists of regular guys like him and me who are fed up with Republican and Democrat politicians alike so keenly focused on government expansion and intrusion into our lives. I told him the Tea Party mantra used to be called the Libertarian Party. The Tea Party, like Microsoft, rose out of nowhere and grabbed all the attention. I told my friend how sad it is that the Libertarian Party, like Novell, has consistently failed to market itself as a viable option and, thus, we are where we are today. Just damn.

Novell, Libertarian Party or whatever - lots of excellent products and great ideas are/were out there for the taking. Logic sales but who's buying...?
Read More
Posted in government intrusion, marketing hype, Novell, politics, scary stuff, stupid security, thinking long term | No comments

Tuesday, 26 April 2011

What's this "firewall" you speak of??

Posted on 11:56 by Unknown
It seems that #firewalls are making a comeback. Of course, I felt compelled to throw in my two cents worth so here are some new pieces I wrote for the fine folks at SearchNetworking.com on firewalls and firewall management:

Firewall change management and automation can curb human error

Do Web application firewalls complicate enterprise security strategy?

Planning a virtualization firewall strategy

Enjoy!

As always, be sure to check out www.principlelogic.com/resources.html for links to all of my information security books, articles, whitepapers, podcasts, webcasts and more.
Read More
Posted in application firewalls, compliance, firewalls, Kevin's security content, network security, pci dss | No comments

Monday, 25 April 2011

The positive side of infosec

Posted on 05:17 by Unknown
"Have you ever, even once, stopped to marvel at just how often things go right? It's amazing." -Richard Carlson

With all of the smack talk and negative approaches so many of us (myself included) take regarding IT and information security, this'll make you realize that it's not all bad. I we could all benefit from stopping to smell the roses and seeing the bright side of our field every now and then.
Read More
Posted in great quotes, information security quotes, security leadership, thinking long term | No comments

Sunday, 24 April 2011

Tidbits on enterprise mobile security

Posted on 17:06 by Unknown
Here are some recent pieces I wrote for SearchEnterpriseDesktop.com on the subject of mobile security that you may be interested in:

Securing the new desktop: enterprise mobile devices

Security tools that can boost Windows Mobile and Windows Phone 7 security


Whole disk encryption gotchas to look out for


Enjoy!

As always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, whitepapers, podcasts, webcasts and more.
Read More
Posted in desktop management, drive encryption, Kevin's security content, laptop encryption, mobile security, smartphone security, Windows Mobile | No comments

Thursday, 21 April 2011

Amazon's cloud outage - does it change your perception of the cloud?

Posted on 14:12 by Unknown
Everyone (okay, many; especially the vendor marketing types) keeps swearing by the "cloud"...and then Amazon's EC2 goes down today. How does that affect how you view the cloud?

I've been a skeptic and I'm still a skeptic...beware the cloud bandwagon.
Read More
Posted in cloud computing, disaster recovery, incident response, stupid security, thinking long term | No comments

Wednesday, 20 April 2011

Holy Cow: Police seizing info from phones during traffic stops

Posted on 08:11 by Unknown
Here's some big time scary stuff personally and something that'll no doubt lead to big time security problems for the enterprise. Michigan State Police are copying data off of smartphones during minor traffic stops using the Cellebrite Universal Forensics Extraction Device. Images, address books, files, whatever...it's now fair game for the police (Gestapo?) in Michigan to take whatever whenever.

Is this government out of control or what!?

I know we've all but forgotten about the Constitution in this country but if this happens to me, I guarantee you they'd get nothing - I mean nothing - without probable cause and a warrant.

Yet another reason to force users to put passwords on their smartphones....Oh, and a control that wipes the phone after X number of failed password attempts.

Wow, crazy stuff...what's going to be next?
Read More
Posted in government intrusion, government regulations, scary stuff, smartphone security, stupid security | No comments

Legalese in email footers is useless

Posted on 05:23 by Unknown
Ever get annoyed by those email footers telling you what you can or cannot do with the email you just received? Yeah, me too. Here's an interesting bit from Consumer Reports that talks about how those legal disclaimers in email footers may be legally useless.

It's funny, every time I see them (they're in about 60-70% of the non-spam emails I recieve) I think it's yet another representation of the American way to disclaim any personal responsibility. If anything goes awry when sending an email, it's someone else's fault.

Furthermore, as Consumer Reports mentions at the end of the article, the run-on sentences end up using more ink and paper when emails are printed...wonder what the "global warming" crowd thinks of that? Now there's an opportunity for the the anti-capitalism movement that I might consider buying in to.

Anyway, however you see this issue, be sure to speak with your legal counsel first before making any rash decisions (like reconfiguring Exchange to drop these email footers once and for all). ;-)
Read More
Posted in compliance, global warming, legal, personal responsibility, stupid security | No comments

Tuesday, 19 April 2011

Learning is a choice

Posted on 13:24 by Unknown
"If your intent is to learn, you almost always do learn." - Richard Carlson

Like when we see what we want to see, we learn what we want to learn. This is important for our careers in IT and infosec but also provides a great way for us to become better people.
Read More
Posted in careers, great quotes, information security quotes, personal responsibility, security leadership, thinking long term | No comments

Coffee shop laptop thefts in Atlanta a good reminder

Posted on 04:23 by Unknown
Here's a good reason why you need to remind your employees of the risks of using laptops in coffee shops and other public places. Once the thief has it, it's all over...unless of course a brave (stupid?) coffee shop employee comes to your rescue.

A good rule of thumb is if you're setting up shop for a while then use a laptop lock to secure the system to the table. Most importantly, never, ever leave laptops unattended. I know, it does look a little goofy carrying your laptop into the john but, as in other aspects of life, substance (common sense) trumps style.
Read More
Posted in laptop encryption, laptop security, mobile security, scary stuff, stupid security, telecommuting | No comments

Monday, 18 April 2011

From each according to his ability to each according to his need

Posted on 06:42 by Unknown
I thought this Marxist/Obama philosophy was very fitting for our symbolic day today here in the U.S. The general belief that the government should decide what the people need is what's driving our country...and the world. And we wonder why we can't get out of this economic mess! The reality is that the economy cannot be taxed into prosperity but that's what the politicians want to make us believe...especially if they can play on the emotions of the non-achievers - the other 50% of income earners who pay no taxes.

Speaking of this divide, here's a good read on how if the Feds seized all of the income of the top 1% of income earners they couldn't even run the federal government for a year! How can a $980 billion tax base possibly fund a $4 trillion government budget? It can't but no one talks about that. Instead the media and its myrmidon followers just want more taxes...As with government schools, just throw more money at the problem, that'll fix it.

Folks, we don't have a taxation problem, we have a spending problem. But as Obama and the other political elite want us to believe, government is the answer to everything.

On a related note, as Art Laffer wrote today in the WSJ, there's a 30% cost markup on every dollar paid in taxes. In fact, according to his piece: "Tax compliance employs more workers than Wal-Mart, UPS, McDonald's, IBM and Citigroup combined." Amazing...Just like the data breach problem, I know without a doubt that taxation and government growth is MUCH worse - impacting so many lives in a negative way - than most people it perceive it to be.

People largely want personal security over freedom. As with many information security issues people don't want to take personal responsibility for their choices and their actions. Sadly, it's the way of the world - apparently human nature...If you fall into the achiever class you've just got to figure out how to work your way through it. As for me, I can't wait to get the next two months over with so I can stop funding the government with what I earn and start keeping my own money for my own family.
Read More
Posted in data breaches, government regulations, personal responsibility, scary stuff | No comments

Friday, 15 April 2011

Be wary of the well-certified IT pro

Posted on 09:21 by Unknown
You may have read that Gartner projects IT spending to increase in 2011. It's great news that may lead to hiring new staff or at least new consultants for your IT and information security projects....Just proceed with caution and don't fall for the "I'm certified therefore I'm all you need" persona that's rampant in our industry.

There are a lot of people out there looking for work - many of which have added one, two, perhaps five or more IT/security certifications such as CCNA and CISSP to their names over the past year. But you have to be forewarned: just because someone has passed a certification testing regimen doesn't mean he or she is going to be 1) a disciplined worker, 2) a good communicator, 3) have goals, or 4) possess that sticktuitiveness required to succeed in IT.

Certification only goes so far. In fact, I've often found that the more certifications one has the harder he or she is "trying" to prove something to mask other deficiencies (likely the very things you're in need of). Ironically, some of the sharpest and most productive people in IT and infosec have no certifications at all.

It's a harsh reality but it is what it is. Buyer beware.
Read More
Posted in careers, certifications, personal responsibility, running a business, scary stuff | No comments

Tuesday, 12 April 2011

Have no fear and be free

Posted on 10:37 by Unknown
"The whole secret of existence is to have no fear. Never fear what will become of you, depend on no one. Only the moment you reject all help are you freed." -Buddha

This is great for personal power, personal responsibility and, of course, information security - just be careful with that "reject all help" bit. ;)
Read More
Posted in careers, great quotes, information security quotes, personal responsibility, thinking long term | No comments

Friday, 1 April 2011

Web security tidbits on developers, leadership, weak passwords & more

Posted on 18:23 by Unknown
Here are a few pieces I've written recently on Web application security you may be interested in...things that affect each and every one of us working in IT and infosec:

I wouldn’t want to be a developer these days

Don’t overlook the importance of authenticated testing

You can’t change what you tolerate


Testing for weak passwords: a common oversight without a great solution

How often should you test your web applications?

Notable changes in the PCI DSS 2.0 affecting Web application security

Enjoy!

Also, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts and more.
Read More
Posted in automated scanner oversights, compliance, Kevin's security content, passwords, pci dss, security leadership, software development, vulnerability assessments, web application security | No comments

Time management + getting over your job title in IT

Posted on 18:12 by Unknown
Here are some IT career bits I wrote for TechTarget's SearchWinIT.com that you may be interested in:

Time management strategies for the IT pro


Your title is worthless; your value is priceless

This is the best time ever to focus on these things.

Enjoy!

Also, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts and more.
Read More
Posted in careers, goal setting, Kevin's security content, personal responsibility, security leadership, thinking long term, time management | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • How you can get developers on board with security starting today
    Some people - including a brilliant colleague of mine - think security is not the job of software developers . In the grand scheme of things...
  • NetScan Tools LE - a must-have for investigators
    Have you ever had a need to run a program and get a relatively small amount of data just to do your job but end up getting caught in the com...
  • "Top Blogs" list & some home security considerations
    I think I may have found the first sign that my blog is growing and gaining some traction. I've made it to the Top 20 Home Security Blog...
  • Wooo...HIPAA audits are coming & the irony of KPMG's involvement
    I've always believed that compliance is a threat to business [hence why I help businesses take the pain out of compliance by addressing ...
  • Great tool for seeking out sensitive info on your network
    One of the greatest risks in business today is the issue of unstructured information scattered about the network waiting to be misused and ...
  • It's hard being human
    Cavett Robert once said something about character that resonates within information security - especially regarding ongoing management and l...
  • Dario Franchitti and I
    As many of you know I'm a motorsports nut -both as a driver and a fan. This provided the influence for my Security On Wheels logo. Well,...
  • The value of partial code scanning, now
    Check out my new piece on the business value of partial code scanning where I outline why it's better to start your source code analysi...
  • Be it in healthcare or infosec, the short term is for losers
    With all the doctor & hospital visits I've gone (and am still going) through with family members in the past few years, I've com...
  • Live from #RSAC: Cloud computing's got some kinks (but you knew that)
    I'm attending the RSA Conference this week and just sat through a panel discussion on cross-jurisdictional issues in the cloud. It was p...

Categories

  • active directory
  • application firewalls
  • APTs
  • aslr
  • atm security
  • audio programs
  • audit logging
  • automated scanner oversights
  • back to basics
  • backups
  • big brother
  • bitlocker
  • budget
  • business case for security
  • business continuity
  • BYOD
  • car hacking
  • careers
  • certifications
  • change management
  • checklist audits
  • cissp
  • clear wireless
  • cloud computing
  • communication
  • compliance
  • computer glitch
  • conferences
  • consulting
  • content filtering
  • cool products
  • cool sites
  • cross-site request forgery
  • cross-site scripting
  • csrf
  • customer no service
  • cybersecurity bill
  • data at rest
  • data breach laws
  • data breaches
  • data centers
  • data destruction
  • data leakage
  • data protection
  • data retention
  • database security
  • degrees
  • desktop management
  • disaster recovery
  • disk imaging
  • disposal
  • dns
  • document security
  • domino
  • DoS attacks
  • drive encryption
  • e-discovery
  • ediscovery
  • employee monitoring
  • encrypting data in transit
  • encryption
  • end point security
  • ethical hacking
  • exchange
  • experience
  • expert witness
  • exploits
  • facebook
  • FERPA
  • file integrity monitoring
  • firewalls
  • forensics
  • full disk encryption
  • global warming
  • goal setting
  • good blogs
  • government intrusion
  • government regulations
  • great quotes
  • hacking
  • hardware
  • hipaa
  • hitech
  • hitech act
  • home security
  • humor
  • identity access management
  • identity theft
  • IIS
  • incident response
  • information classification
  • information security quotes
  • intel
  • intellectual property
  • internal threat
  • java
  • Kevin's books
  • Kevin's interviews
  • Kevin's keynotes
  • kevin's panels
  • kevin's quotes
  • Kevin's security content
  • Kevin's seminars
  • Kevin's videos
  • laptop encryption
  • laptop security
  • legal
  • Linux
  • locking screens
  • low-hanging fruit
  • malware
  • marketing hype
  • message from Kevin
  • messaging security
  • metasploit
  • metrics
  • mobile apps
  • mobile security
  • motivation
  • multi-factor authentication
  • network analysis
  • network complexities
  • network protocols
  • network security
  • networking essentials
  • Novell
  • office
  • online backup
  • online safety
  • open source security
  • owasp
  • p2p
  • passwords
  • patch management
  • patching
  • pci 6.6
  • pci dss
  • PCNAA
  • penetration testing
  • people problems
  • personal responsibility
  • phishing
  • physical security
  • pii
  • podcasts
  • policy enforcement
  • politics
  • presentations
  • privacy
  • quality assurance
  • recommended books
  • recommended magazines
  • recycling
  • remote access security
  • ridiculous password requirements
  • risk analysis
  • risk management
  • rogue insiders
  • ROI
  • RSA 2012
  • running a business
  • saas
  • salary
  • scary stuff
  • sccm
  • sdlc
  • security assessments
  • security audits
  • security awareness
  • security committees
  • security leadership
  • security management
  • security operations
  • security policies
  • security policy
  • security scans
  • security standards
  • security statistics
  • security technologies
  • security testing tools
  • security tools
  • selling security
  • sharepoint
  • small business
  • smartphone security
  • SMBs
  • social media
  • software development
  • source code
  • source code analysis
  • special offer
  • SQL injection
  • sql server
  • ssl
  • storage security
  • student information systems
  • stupid security
  • success
  • telecommuting
  • testimonials
  • thinking long term
  • third-party applications
  • threat modeling
  • time management
  • training
  • twitter
  • uncool products
  • unstructured information
  • unstructured infromation
  • user awareness
  • vendors
  • virtual machine security
  • visibility
  • voip
  • vulnerability assessments
  • web 2.0
  • web application security
  • web browser security
  • web server security
  • webcasts
  • WebInspect
  • whitelisting
  • whitepapers
  • Windows
  • Windows 7
  • windows 8
  • windows 8.1
  • Windows Mobile
  • windows security
  • Windows Vista
  • wireless
  • wireless security
  • zero tolerance

Blog Archive

  • ►  2013 (35)
    • ►  November (3)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  July (3)
    • ►  June (1)
    • ►  May (4)
    • ►  April (4)
    • ►  March (4)
    • ►  February (5)
    • ►  January (5)
  • ►  2012 (77)
    • ►  December (2)
    • ►  November (2)
    • ►  October (4)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (5)
    • ►  March (10)
    • ►  February (14)
    • ►  January (16)
  • ▼  2011 (163)
    • ►  December (15)
    • ►  November (11)
    • ►  October (9)
    • ►  September (16)
    • ►  August (13)
    • ►  July (8)
    • ►  June (13)
    • ►  May (18)
    • ▼  April (16)
      • Nikon Image Authentication vulnerability
      • The mobile device free-for-all dilemma
      • Novell, Utah and the Libertarian Party
      • What's this "firewall" you speak of??
      • The positive side of infosec
      • Tidbits on enterprise mobile security
      • Amazon's cloud outage - does it change your percep...
      • Holy Cow: Police seizing info from phones during t...
      • Legalese in email footers is useless
      • Learning is a choice
      • Coffee shop laptop thefts in Atlanta a good reminder
      • From each according to his ability to each accordi...
      • Be wary of the well-certified IT pro
      • Have no fear and be free
      • Web security tidbits on developers, leadership, we...
      • Time management + getting over your job title in IT
    • ►  March (13)
    • ►  February (13)
    • ►  January (18)
  • ►  2010 (170)
    • ►  December (10)
    • ►  November (14)
    • ►  October (7)
    • ►  September (27)
    • ►  August (20)
    • ►  July (8)
    • ►  June (15)
    • ►  May (4)
    • ►  April (23)
    • ►  March (21)
    • ►  February (11)
    • ►  January (10)
  • ►  2009 (55)
    • ►  December (5)
    • ►  November (10)
    • ►  October (21)
    • ►  September (19)
Powered by Blogger.

About Me

Unknown
View my complete profile