Tech Support For Dummies

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 27 June 2011

The value of partial code scanning, now

Posted on 13:14 by Unknown
Check out my new piece on the business value of partial code scanning where I outline why it's better to start your source code analysis now instead of waiting around until certain milestones of your development projects are reached or your software applications are completed altogether.

It's kind of funny and ironic that we humans are all about instant gratification, yet with information risk issues such as source code analysis, we tend to want to wait until everything's perfect (and way more costly) before we get started. This reminds me of the Mark Victor Hansen quote:

“Don't wait until everything is just right. It will never be perfect. There will always be challenges, obstacles and less than perfect conditions. So what. Get started now. With each step you take, you will grow stronger and stronger, more and more skilled, more and more self-confident and more and more successful.”

I wrote this article in conjunction with the nice folks at Checkmarx who happen to produce the best static source code analysis tool I've used...especially given its price compared to the competition - it's not even in the same galaxy as some of the others out there. Definitely worth checking out.
Read More
Posted in cool products, great quotes, information security quotes, Kevin's security content, security testing tools, software development, source code analysis, thinking long term | No comments

Dropbox "bug" = why the cloud cannot be blindly trusted

Posted on 11:16 by Unknown
I've been ranting about "the cloud" (what a tired term) for a couple of years now. As if we haven't seen enough examples lately of why we cannot put all our eggs in the cloud basket, here's one more with the "code bug" that impacted Dropbox's authentication mechanism over the weekend.

Sure, Dropbox isn't an enterprise cloud app per se but I'll guarantee you it's impacting your enterprise this very moment. Think data backups, intellectual property, PII, password safes and whatever else your users are syncing across their multiple systems.

How do you explain such exposures to management or to your board when something like this happens. Do you say "Well, our cloud provider said their system was secure because they use SSL and, furthermore, have a SAS 70 Type II audit report to prove it." or "Our legal team approved of the contract and the SLA and gave us the go-ahead."??

I don't know that management will ever get on board the way they need to but cloud insecurities will certainly work themselves out in the marketplace - and in the courts - and eventually get on the radar of the people that matter.

This Dropbox dilemma is a relatively small and insignificant example of what happens when you completely rely on others for information security. I'm not saying don't use the cloud. I'm saying get your arms around the cloud before it impacts your business in a negative way. Odds are it's going to somehow and everyone will be looking at you for a well thought out response.
Read More
Posted in cloud computing, security leadership, stupid security, thinking long term, vendors, web application security | No comments

Saturday, 25 June 2011

Exchange incident response, ASLR & common Windows security mistakes

Posted on 18:39 by Unknown
From Exchange to Windows Server to Windows at the desktop, here are some new pieces I've written about Microsoft security that you may be interested in:

Six commonly overlooked Exchange security vulnerabilities

Solidify Your Exchange Server Incident Response Plan

10 most common security mistakes people are still making

Why you need address space layout randomization in Windows Server 2008 R2

Enjoy!

As always, be sure to check out www.principlelogic.com/resources.html for links to my 500+ articles, whitepapers, podcasts, webcasts, books and more.
Read More
Posted in aslr, exchange, incident response, messaging security, stupid security, Windows, windows security | No comments

Monday, 20 June 2011

I'm a speaker at the Gartner Infosec show this week

Posted on 13:50 by Unknown
For those of you who happen to be attending the Gartner Security and Risk Management Summit in DC this week, I'd love it if you could check out my session or at least stop by to say hello. I'll be serving as a panelist on mobile security at the following session:

Protect Your Identity, Mobile PC and Data

Session Code SPS13 - Potomac Ballroom 1
9:30-10:30am

Cheers!
Read More
Posted in identity theft, kevin's panels, message from Kevin, mobile security | No comments

Saturday, 18 June 2011

When's political correctness going to impact infosec?

Posted on 09:23 by Unknown
Witnessing the Thought Police's handling of the Tracy Morgan debacle I can't help but wonder if political correctness is not the beginning of dictatorships, Communism, etc. where the population is not allowed to speak up or out against anything.

Don't get me wrong. Being a libertarian, I'm pro-choice on everything...To each his own. As long as you're not affecting the life, liberty or property of someone else, then say what you need to say and do what you need to do. Sure, I know we need to be sensitive in certain situations. The problem is that political correctness leads to the legislation of our thoughts and feelings...Tell me, just how different is that from dictatorships and Communism in parts of the world where, ironically, people cry out for "human rights" because of the oppression brought on by, well, ourselves?

It'll be interesting to see how political correctness invades the very fiber of information security and privacy in businesses down the road. Will we eventually reach a point in the not so distant future where it'll be politically incorrect (esp. here in the U.S.) to tell people what websites they can or cannot use or what applications they can load on their endpoint devices connected to the business network? Will it be demeaning to others when we suggest strong passwords or we point out how security oversights brought on by people making poor choices are bringing the business down?

I'm just saying...People are complex and these are things that are impacting us personally now and likely in our work down the road. How are you going to handle it?
Read More
Posted in government intrusion, policy enforcement, politics, scary stuff, stupid security | No comments

Friday, 17 June 2011

Proud to be a speaker on the TechTarget roadshow

Posted on 09:25 by Unknown
I just completed two seminars this past week for TechTarget and CDW...One was in Minneapolis, which by the way, was probably the friendliest city I've EVER visited. Great bunch of folks...thanks for the great Midwestern turnout and hospitality!

Our second stop was San Francisco...one of my most favorite cities to visit. I also had the opportunity to visit the nice folks at one of my publishers: Realtimepublishers.com (publisher of my latest book that I'll be posting about soon) and one of the websites where I serve as an IT security expert: Focus.com. Just meeting these people for the first time made the trip worthwhile.

If you're not familiar with it, you should check out these security seminars we're doing...lot's of good discussions around what it takes to really get your arms around the security beast. We may be coming to a town hear you between now and year's end. Here's the website:

Predictive Security: Plan Ahead to Stay Ahead of the Next Threat
Read More
Posted in cool sites, Kevin's keynotes, Kevin's seminars, message from Kevin | No comments

Hacking tools & malware creation illegal - what's next?

Posted on 06:38 by Unknown
With all the criminal behavior taking place on computers around the world, it appears that politicians are seeking some solutions. For instance, European Union Justice Ministers are proposing a ban on hacking tools. I suspect this law will work just as well as gun laws in the U.S. Simply criminalize the inanimate object (or code) and only the law-abiding citizens will comply. It creates the perfect storm for criminals to be able to continue doing what they do.

Furthermore, an unintended consequence of such tools being banned and kept from legitimate use like in the independent security assessment work that I and many of my colleagues do, then businesses in general suffer.

The burning question is: who decides what hacking tools really are? Are they password crackers? Vulnerability scanners? Perhaps Web browsers in general? I suspect they'll have a panel of ignorant bureaucrats making the call like what our "leaders" here in the U.S. (Obama, Pelosi, etc.) envision with their ObamaCare death panels. Government knows best.

On a related note, just today the Japanese parliament enacted legislation that criminalizes the creation of malware. Is this any different? It can certainly be argued that malware serves no purpose other than to do harm. Of course, many people around the world believe the same thing about guns owned and used for the sole purpose of self-defense.

It's a complicated world we live in...what to do now?
Read More
Posted in government intrusion, government regulations, hacking, malware, scary stuff, stupid security | No comments

Monday, 13 June 2011

IT careers, compliance & the Internet "Freedom" Act

Posted on 14:01 by Unknown
Here are some recent pieces I wrote on IT and security careers and compliance that you may be interested in...content that likely applies to your very situation:

Career networking dos and don’ts


But Compliance is Someone Else’s Job!

Cybersecurity and Internet Freedom Act – New name, same game

Enjoy!

As always, be sure to check out www.principlelogic.com/resources.html for links to my 500+ articles, whitepapers, podcasts, webcasts, books and more.
Read More
Posted in careers, compliance, government intrusion, government regulations, security leadership, stupid security | No comments

New WebsiteDefender from @Acunetix worth a look-see

Posted on 13:45 by Unknown
The folks at Acunetix have a neat new product/service called WebsiteDefender. I've yet to try it myself but it looks promising - fills a nice niche.

WebsiteDefender is an agent-based tool for websites and WordPress-based blogs that:
  • Scans your site for security flaws
  • Detects malware running on your site
  • Alerts you to suspicious web site activity including file changes
The obvious benefit is to have a more secure online presence but as Acunetix is marketing WebsiteDefender, it can also keep you from getting blacklisted by Google and presumably from being listed as questionable by services like Web of Trust.

Certainly worth checking out. More info to come once I take it for a spin...
Link
Read More
Posted in cool products, hacking, malware, web application security, web server security | No comments

Friday, 10 June 2011

The best information security quote ever

Posted on 09:54 by Unknown

Thinking about all the security incident headlines over the past 30 days alone, this says it all:

"We can evade reality but we cannot evade the consequences of evading reality." -Ayn Rand

Read More
Posted in great quotes, information security quotes, personal responsibility, security leadership, thinking long term | No comments

Wednesday, 8 June 2011

Weiner fallout: "I got hacked" is the new scapegoat

Posted on 09:27 by Unknown
I recently met up with some technology lawyer colleagues after work and we shared our thoughts on the Anthony Weiner "incident". We were talking about how early on in the saga no one but Weiner and the lucky recipients of his tweets really knew what the truth was. Predictably, as we're seeing and hearing more and more these days, Weiner came out and said "I was hacked. It happens to people." In other words, instead of claiming personal responsibility for the issue, he could just claim someone else did it and hopefully wash his hands of the issue.

Don't get me wrong. Companies and people do get hacked, but hacking is not always what caused the problem.

Then it came to us, "I've been hacked" is the new scapegoat. Savvy politicians and business leaders know that getting "hacked" is a generic enough claim that the general public may buy it. After all, many people believe that hacking is this mysterious, intangible "thing" that just happens these days. It's simply dismissed as "Oh well, sucks to be that person or business". Such an excuse is very similar to what I've written about "computer glitches". It's an easy way out.

Interestingly, one thing that hasn't really been discussed in the media covering WeinerGate was here's how you get to the truth...you do X, Y and Z to reveal what really happened. Be it a simple forensics analysis of Weiner's computer(s) all the way to subpoenaing Twitter for their log files associated with the usernames, dates and times in question, there's a way to get to the bottom of such matters. These procedures are carried out as part of the legal process in countless investigations and lawsuits every day in the US. But we weren't hearing about that.

We now know that a formal investigation wasn't needed with Weiner. However, if you're caught in a bind and need to prove your innocence, the e-discovery and forensics processes have a nice way of working things out...It's all a matter of choice and, I suppose, context.

Perhaps it's time to step back, fix the low-hanging fruit that's putting your business at risk, and move forward with your chin up willing to take responsibility for information security once and for all. No scapegoats necessary...
Read More
Posted in back to basics, cloud computing, computer glitch, e-discovery, ediscovery, forensics, hacking, low-hanging fruit, personal responsibility, scary stuff, stupid security | No comments

Tuesday, 7 June 2011

New tool for ferreting out users w/local admin rights

Posted on 07:20 by Unknown
Here's a free tool by @ViewFinity (the privilege management vendor I wrote about back in March) that helps you discover user accounts that have local admin rights:
Viewfinity Local Admin Discovery

...looks pretty neat if you have a need for running a quick test during an assessment or audit or just want to have something to use periodically to ensure user accounts are kept in check.
Read More
Posted in active directory, cool products, identity access management, security assessments, security testing tools | No comments

Monday, 6 June 2011

InfraGard Atlanta hack highlights some lessons for us all

Posted on 05:22 by Unknown
What started with an email from a colleague's compromised Gmail account Friday evening has ended up making international news - the InfraGard Atlanta website has been hacked. With user names, email addresses and passwords - including those associated with the FBI - available via a quick web search I knew that this was a pretty serious issue. Although I've been disconnected from InfraGard Atlanta for the past ~6 years, I originally served as an officer when the group was getting off the ground back in the early 2000s...I hate seeing something like this happen to my friends and colleagues.

What's so frustrating in situations like this is the fact there are so many people associated with InfraGard Atlanta who are well-qualified (and often very willing) to pitch in and help to prevent such breaches. It must be human nature because I've offered to do gratis security assessments for various non-profits I've been associated with over the past few years and a funny - yet consistent - thing occurs every time...It's cricket, cricket, then nothing but silence...Or "no thanks, we're good" or "it's just our website" or "we don't have anything a hacker would want"...and on and on. You get my drift. Why is it we tend to ignore the elephant in the room and pass on pro bono services where they're often needed the most? I digress.

So, what can we do about this other than getting people to buy into security which I suspect isn't going to happen any time soon? The best thing you can do is to test every single system that's publicly accessible on your network. It's the only way you're going to find the flaws that matter...and man oh man, do we ever have some low-hanging fruit out there for the taking! Still, all the penetration and vulnerability testing you can throw at your systems is not going to uncover every single flaw in your environment. But it'll get you darn close and that's where you want to be.

All of that said, here are the lessons to take from this:

1) Test your websites and your externally-accessible hosts for security flaws...ALL of them, right now! Start today.

2) Test your websites and your externally-accessible hosts for security flaws over and over again, never letting up until the sites/hosts are taken offline [by choice, not denial of service ;)].

3) Fix the flaws you find.

4) Stop making bad password decisions. We've all done it and it's got to stop. Make a conscious choice right now to change that moving forward. Vow to never create an insecure password again and vow to stop sharing passwords across different websites and systems. Also, start going back and changing weak passwords that you know exist out there.

If you find the passwords that were recovered in the InfraGard Atlanta breach you'll see how "complex" passwords can still be cracked. Sure, part of such password flaws are architecture or operational-based weaknesses but my point is if you have a choice, then choose to create long and complex passphrases that are easy to remember yet next to impossible to crack.

The choice is yours....use it wisely.
Read More
Posted in data breaches, hacking, passwords, scary stuff, stupid security | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • How you can get developers on board with security starting today
    Some people - including a brilliant colleague of mine - think security is not the job of software developers . In the grand scheme of things...
  • NetScan Tools LE - a must-have for investigators
    Have you ever had a need to run a program and get a relatively small amount of data just to do your job but end up getting caught in the com...
  • "Top Blogs" list & some home security considerations
    I think I may have found the first sign that my blog is growing and gaining some traction. I've made it to the Top 20 Home Security Blog...
  • Wooo...HIPAA audits are coming & the irony of KPMG's involvement
    I've always believed that compliance is a threat to business [hence why I help businesses take the pain out of compliance by addressing ...
  • Great tool for seeking out sensitive info on your network
    One of the greatest risks in business today is the issue of unstructured information scattered about the network waiting to be misused and ...
  • It's hard being human
    Cavett Robert once said something about character that resonates within information security - especially regarding ongoing management and l...
  • Dario Franchitti and I
    As many of you know I'm a motorsports nut -both as a driver and a fan. This provided the influence for my Security On Wheels logo. Well,...
  • The value of partial code scanning, now
    Check out my new piece on the business value of partial code scanning where I outline why it's better to start your source code analysi...
  • Be it in healthcare or infosec, the short term is for losers
    With all the doctor & hospital visits I've gone (and am still going) through with family members in the past few years, I've com...
  • Live from #RSAC: Cloud computing's got some kinks (but you knew that)
    I'm attending the RSA Conference this week and just sat through a panel discussion on cross-jurisdictional issues in the cloud. It was p...

Categories

  • active directory
  • application firewalls
  • APTs
  • aslr
  • atm security
  • audio programs
  • audit logging
  • automated scanner oversights
  • back to basics
  • backups
  • big brother
  • bitlocker
  • budget
  • business case for security
  • business continuity
  • BYOD
  • car hacking
  • careers
  • certifications
  • change management
  • checklist audits
  • cissp
  • clear wireless
  • cloud computing
  • communication
  • compliance
  • computer glitch
  • conferences
  • consulting
  • content filtering
  • cool products
  • cool sites
  • cross-site request forgery
  • cross-site scripting
  • csrf
  • customer no service
  • cybersecurity bill
  • data at rest
  • data breach laws
  • data breaches
  • data centers
  • data destruction
  • data leakage
  • data protection
  • data retention
  • database security
  • degrees
  • desktop management
  • disaster recovery
  • disk imaging
  • disposal
  • dns
  • document security
  • domino
  • DoS attacks
  • drive encryption
  • e-discovery
  • ediscovery
  • employee monitoring
  • encrypting data in transit
  • encryption
  • end point security
  • ethical hacking
  • exchange
  • experience
  • expert witness
  • exploits
  • facebook
  • FERPA
  • file integrity monitoring
  • firewalls
  • forensics
  • full disk encryption
  • global warming
  • goal setting
  • good blogs
  • government intrusion
  • government regulations
  • great quotes
  • hacking
  • hardware
  • hipaa
  • hitech
  • hitech act
  • home security
  • humor
  • identity access management
  • identity theft
  • IIS
  • incident response
  • information classification
  • information security quotes
  • intel
  • intellectual property
  • internal threat
  • java
  • Kevin's books
  • Kevin's interviews
  • Kevin's keynotes
  • kevin's panels
  • kevin's quotes
  • Kevin's security content
  • Kevin's seminars
  • Kevin's videos
  • laptop encryption
  • laptop security
  • legal
  • Linux
  • locking screens
  • low-hanging fruit
  • malware
  • marketing hype
  • message from Kevin
  • messaging security
  • metasploit
  • metrics
  • mobile apps
  • mobile security
  • motivation
  • multi-factor authentication
  • network analysis
  • network complexities
  • network protocols
  • network security
  • networking essentials
  • Novell
  • office
  • online backup
  • online safety
  • open source security
  • owasp
  • p2p
  • passwords
  • patch management
  • patching
  • pci 6.6
  • pci dss
  • PCNAA
  • penetration testing
  • people problems
  • personal responsibility
  • phishing
  • physical security
  • pii
  • podcasts
  • policy enforcement
  • politics
  • presentations
  • privacy
  • quality assurance
  • recommended books
  • recommended magazines
  • recycling
  • remote access security
  • ridiculous password requirements
  • risk analysis
  • risk management
  • rogue insiders
  • ROI
  • RSA 2012
  • running a business
  • saas
  • salary
  • scary stuff
  • sccm
  • sdlc
  • security assessments
  • security audits
  • security awareness
  • security committees
  • security leadership
  • security management
  • security operations
  • security policies
  • security policy
  • security scans
  • security standards
  • security statistics
  • security technologies
  • security testing tools
  • security tools
  • selling security
  • sharepoint
  • small business
  • smartphone security
  • SMBs
  • social media
  • software development
  • source code
  • source code analysis
  • special offer
  • SQL injection
  • sql server
  • ssl
  • storage security
  • student information systems
  • stupid security
  • success
  • telecommuting
  • testimonials
  • thinking long term
  • third-party applications
  • threat modeling
  • time management
  • training
  • twitter
  • uncool products
  • unstructured information
  • unstructured infromation
  • user awareness
  • vendors
  • virtual machine security
  • visibility
  • voip
  • vulnerability assessments
  • web 2.0
  • web application security
  • web browser security
  • web server security
  • webcasts
  • WebInspect
  • whitelisting
  • whitepapers
  • Windows
  • Windows 7
  • windows 8
  • windows 8.1
  • Windows Mobile
  • windows security
  • Windows Vista
  • wireless
  • wireless security
  • zero tolerance

Blog Archive

  • ►  2013 (35)
    • ►  November (3)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  July (3)
    • ►  June (1)
    • ►  May (4)
    • ►  April (4)
    • ►  March (4)
    • ►  February (5)
    • ►  January (5)
  • ►  2012 (77)
    • ►  December (2)
    • ►  November (2)
    • ►  October (4)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (5)
    • ►  March (10)
    • ►  February (14)
    • ►  January (16)
  • ▼  2011 (163)
    • ►  December (15)
    • ►  November (11)
    • ►  October (9)
    • ►  September (16)
    • ►  August (13)
    • ►  July (8)
    • ▼  June (13)
      • The value of partial code scanning, now
      • Dropbox "bug" = why the cloud cannot be blindly tr...
      • Exchange incident response, ASLR & common Windows ...
      • I'm a speaker at the Gartner Infosec show this week
      • When's political correctness going to impact infosec?
      • Proud to be a speaker on the TechTarget roadshow
      • Hacking tools & malware creation illegal - what's ...
      • IT careers, compliance & the Internet "Freedom" Act
      • New WebsiteDefender from @Acunetix worth a look-see
      • The best information security quote ever
      • Weiner fallout: "I got hacked" is the new scapegoat
      • New tool for ferreting out users w/local admin rights
      • InfraGard Atlanta hack highlights some lessons for...
    • ►  May (18)
    • ►  April (16)
    • ►  March (13)
    • ►  February (13)
    • ►  January (18)
  • ►  2010 (170)
    • ►  December (10)
    • ►  November (14)
    • ►  October (7)
    • ►  September (27)
    • ►  August (20)
    • ►  July (8)
    • ►  June (15)
    • ►  May (4)
    • ►  April (23)
    • ►  March (21)
    • ►  February (11)
    • ►  January (10)
  • ►  2009 (55)
    • ►  December (5)
    • ►  November (10)
    • ►  October (21)
    • ►  September (19)
Powered by Blogger.

About Me

Unknown
View my complete profile