Tech Support For Dummies

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 21 December 2012

IT security careers, committees, and corruption

Posted on 02:37 by Unknown
Here are some new pieces I've written on IT and security leadership (or lack thereof). Enjoy!

What to do when the CIO gets in the way of enterprise IT security

How to form a functional enterprise IT security committee

Understanding management gets your IT department what it needs

Five Concepts for IT Security Success

As always, check out principlelogic.com/resources for links to all of my information security whitepapers, podcasts, webcasts, books, and more.
Read More
Posted in careers, Kevin's security content, personal responsibility, scary stuff, security leadership, security management, selling security, stupid security, success | No comments

Sunday, 9 December 2012

What do credibility, BYOD, & mobile security have in common?

Posted on 13:41 by Unknown
They're the topics of three new pieces I've written!

I can't believe I've been writing more than ever lately but haven't kept up with my posts accordingly. In the interest of catching up, here's some new content I've written on mobile security, BYOD, and IT/security careers:

Credibility is the cornerstone of your career

As BYOD, cloud change networking, VPN management still indispensible

Top 10 reasons we have our heads in the sand over mobile security

By the way, you'll need to register with TechTarget to access the content but their membership is worth it - lots of great resources on practically every IT topic imaginable.

Enjoy!

As always, check out principlelogic.com/resources for links to all of my information security whitepapers, podcasts, webcasts, books and more.
Read More
Posted in BYOD, careers, Kevin's security content, mobile security, security leadership | No comments

Monday, 26 November 2012

Fix for painful authenticated web vulnerability scans requiring MFA

Posted on 07:12 by Unknown
Authenticated web security scans are one of the most frustrating parts of web security assessments. I mean they're downright painful, oftentimes seemingly impossible - especially if multi-factor authentication (MFA) technology is in use. Yet authenticated scans are critically important. It's scary how many times I uncover serious flaws (i.e. SQL injection) while logged-in as a typical user of a web site/application. That is if I can get my web vulnerability scanners to login and work properly!

Side note I have to bring up: I hate to think how many web security flaws are overlooked because people aren't testing their applications as authenticated users. Who am I to question it...

You see, the problem is that web vulnerability scanners are often tripped up with form-based logins. Why? Because they struggle to determine and maintain session state (the browser's/scanner's ongoing communication with the web application). Newer web technologies such as Flash and AJAX are big contributors to the problem, but web applications using MFA can be especially troublesome.

During a recent web security assessment, I struggled - hours on end - to get two different commercial vulnerability scanners to work with Oracle's Bharosa multi-factor authentication technology. I literally lost a day's worth of work trying to get these scanners to record login macros and properly maintain their session state so they could complete their scans.

What a frustrating scenario. The solution was simpler than I thought it'd be. I ended up using a third scanner - NTOSpider, which I've leaned on before to get me out of a bind in such situations - and it worked like a charm! What took me 6+ hours of pain and hassle with the other scanners (with no results, mind you), took just 6 minutes with NTOSpider.

I recorded the login macro, tested it, and got the scan rolling. It was amazingly simple. Given how much NTOSpider got logged out and had to log back in to the application, I could tell it was struggling a bit to maintain state, but it still WORKED! NTOSpider's feature that shows whether or not the scanner is current logged-in to the application is especially nice in these situations.

Side note I have to bring up: I can't imagine how many web security scans are deemed "complete" when they, in reality, failed to authenticate and properly test the application. I suspect this is a huge problem that's being overlooked all the time and people wonder why their web applications are hacked. Who am I to question it...

I'm a big advocate of using multiple scanners when testing web applications...just not in this context! But you've got to do what you've got to do in order to get good results. If you're testing web applications as authenticated users (you should!) and end up struggling to get your login macros to work, know that NTOSpider might just get you out of a bind like it did for me. Or, if it's one of your main scanners, prevent these problems in the first place.

Whether your applications use MFA, form-based logins, or good old-fashioned NTLM pop-up windows, just make sure you're using multiple scanners to test your web applications as they all tend to find unique flaws you probably can't afford to overlook. Oh, and never rely on scanners alone...do that and you'll surely get bitten.
Read More
Posted in automated scanner oversights, cool products, multi-factor authentication, penetration testing, scary stuff, security testing tools, web application security | No comments

Tuesday, 13 November 2012

Are you doing enough to protect your secrets? It's unlikely.

Posted on 07:25 by Unknown
If the person who heads the CIA can't keep his "secrets"; nothing's secret. It's as simple as that.

What are you doing to ensure your intellectual property is protected?

Lawyers will claim their contracts are enough. Management will leave their heads in the sand and claim their IT folks are handling it. Neither are enough.

Fix the silly/ridiculous/inexcusable low-hanging fruit on your network and then put the proper technologies and procedures in place to build things out from there. No matter how much money you've spent, how good your IT staff is, and how much you trust your employees, there's always room for improvement.
Read More
Posted in back to basics, intellectual property, low-hanging fruit, personal responsibility, scary stuff, stupid security, thinking long term | No comments

Wednesday, 10 October 2012

Arguing for infosec's limitations

Posted on 06:21 by Unknown
Here's a powerful information security-related quote that underscores many of the challenges we face:

"Some men have thousands of reasons why they cannot do what they want to, when all they need is one reason why they can." -Willis R. Whitney

Is your management on board with security or not? They're either part of the solution or part of the problem. It's up to you to take the appropriate steps to convince them that information security is better than the alternative.
Read More
Posted in great quotes, information security quotes, personal responsibility, security leadership, thinking long term | No comments

Thursday, 4 October 2012

Calling all executives and managers...

Posted on 04:53 by Unknown
For all those who don't quite "get" information security...You've heard the saying: It's not what happens to you in life that is important - what matters is how you react to what happens.

Don't let this be your mantra for managing information risks!

It DOES matter what happens to you...figure out where you're weak and don't let it happen. Oh, and, have a Plan B.
Read More
Posted in great quotes, incident response, information security quotes, personal responsibility, security leadership, thinking long term | No comments

Tuesday, 2 October 2012

Windows server and workstation security essentials

Posted on 02:00 by Unknown
Over the past couple of months I was so focused on writing new content that I've been remiss in posting it online. Here are some tips, thoughts and general opinions around Windows server and workstation security:

Desktop backup oversights that can get you into a bind

Free open source security tools for finding and fixing Windows flaws

Mobile security and how you can no longer ignore its impact on enterprise desktop management

Why locking down applications at the desktop can provide you with great returns

FAQ: Hardening Windows servers


Enjoy!

As always, check out principlelogic.com/resources for links to all of my information security whitepapers, podcasts, webcasts, books and more.

Read More
Posted in backups, desktop management, Kevin's security content, mobile apps, mobile security, whitelisting, Windows, windows security | No comments

Monday, 1 October 2012

One-sided information risk management doesn't work

Posted on 07:37 by Unknown

Read More
Posted in Kevin's videos, risk management | No comments

Tuesday, 25 September 2012

Be it in healthcare or infosec, the short term is for losers

Posted on 08:03 by Unknown
With all the doctor & hospital visits I've gone (and am still going) through with family members in the past few years, I've come to the conclusion that many (most?) healthcare providers - especially those smart doctors society holds on a pedestal - absolutely cannot see the big picture. They can't think past the appointment time slot in which they're currently working, much less next year and beyond.

Adding to the problem, the left hand never talks to the right so everyone is engaging in their own area of "expertise" yet nothing gets done at a higher level and the patient is the one who ends up suffering because of this approach. Here's an example of what I'm talking about...this is the hospital meal that my father received after going in for a suspected heart attack:

The Dinner of Champions

What's wrong with this picture!? Luckily, for us, it ended up being symptoms from a hiatal hernia. Whew. But still...? Come on healthcare professionals! Hey, at least our beloved Obama is going to fix this...(ha!).

The problem of not seeing the big picture is very common among business execs and even many IT professionals who just don't get what information security is all about. We see it everywhere, especially when data breaches occur...But we also see it when our own peers claim the sky is falling because of the latest Adobe Reader zero day exploit or the Web interface on someone's printer is susceptible to CSRF. Amazing....sad.

The desire for immediate gratification leads to a lot of bad choices. Ask any success/achievement expert and he or she will tell you that the lack of time perspective is one of the greatest problems in society - arguably the one thing that holds people back the most. It certainly has an impact on IT and information security.

If you want to stand out among the noise and the ignorance associated with IT and information security, think long-term in all the decisions you make. Don't expect short-term perfection in your security program. Instead, aim for incremental improvements over time.The missing link is actually making those incremental improvements over time...As Henri Frederic Amiel once said “The person who insists upon seeing with perfect clearness before he or she decides, never decides.” This is no doubt the root cause of the problems we can't seem to solve.
Read More
Posted in automated scanner oversights, careers, government intrusion, government regulations, information security quotes, personal responsibility, scary stuff, stupid security, thinking long term | No comments

Friday, 21 September 2012

Perhaps the biggest & most widespread security gaffe of all

Posted on 09:35 by Unknown

Read More
Posted in disaster recovery, incident response, personal responsibility, scary stuff, stupid security, thinking long term | No comments

Tuesday, 11 September 2012

GoDaddy: 'Malfunction' as the new scapegoat?

Posted on 12:22 by Unknown
We've been hearing about 'computer glitch' for a while. That's what the talking heads on the news always cite when something goes awry with a computer system. Perhaps 'malfunction' is the new scapegoat? That's the route GoDaddy is taking. They say it was a 'malfunction', not hacking, that took them and presumably hundreds of thousands (millions?) of other systems offline for hours yesterday.

I'm sure it had nothing to do with poor planning...or people making bad choices. That'd be too simple...and too responsible. It's easier to blame computer problems on the obscure - something that can't be understood - much less proven - by the general population, even forensics analysts.
 
Calling a network outage a 'malfunction' is similar to how legal counsel encourage executives to refer to security breaches as 'events'. In the end, a business continuity problem is a business continuity problem. It's your responsibility.

Stuff's going to happen. You just have to ask yourself what needs to be done to minimize the impact to your business. Don't wait until the you know what hits the fan to try to figure it out. Here's some material I've written that can help you get started down this path.
Read More
Posted in business continuity, hacking, incident response, personal responsibility, stupid security, thinking long term | No comments

Thursday, 16 August 2012

You can't buy security for $1, but some people will fall for it

Posted on 07:38 by Unknown
I recently deposited a check at a giant monster mega bank that's continually trying to sell me new services and the teller asked: "Would you like to buy identity theft protection for just $1 today?"

Wow, really...so you're saying my personal information will be safe and secure for a mere $1...!? Amazing...but no thanks. Sadly, many in management are like the average consumer: they just don't realize what it takes to ensure information security. No it's not just about anti-virus, or firewalls or that little lock thingy in our Web browsers. No, it's about some set of unenforceable policies sitting on a shelf that no one knows about. Nor is it those silly marketing slicks telling us our privacy "rights".

It's not that simple.

Don't you just know that, right now, this very bank has laptops, tablets, smartphones and the like chock full of sensitive information waiting to be exploited in when a loss or theft occurs. The general public doesn't get security...that's why these banks are successful in selling services that people don't need. I'm not complaining...it's good for our field.

Sadly, consumer ignorance and the unwillingness to question how personal information is handled will be overlooked while, at the same time, many of these very consumers will blame the big evil corporations for trying to make a profit. Who's the real dummy here?

Side note: identity theft protection is not a bad thing to have...Based on what I see in my information security assessment work, I wouldn't dare be without it! Just don't pay for it...Not even $1. Here's some info on how you can get it for free.

Read More
Posted in identity theft, laptop encryption, mobile security, privacy, scary stuff, stupid security, uncool products | No comments

Tuesday, 14 August 2012

Aiming for the CISSP? Check out this book.

Posted on 05:41 by Unknown



I recently completed the technical edits for the new book CISSP For Dummies, 4th edition. It's a great book (not because of my contribution!) that I wish I would've had when I was studying for my CISSP test back in 2001. If you're prepping for the CISSP exam or just want to brush up on the fundamental concepts of information security, this book is a must-have. Just keep in mind what I've always said, certifications are only part of the information security career equation.

Interesting side note: Years ago, around the time I first wrote Hacking For Dummies, Wiley  approached me to write CISSP For Dummies. I had too much going on at the time so I declined the offer. Now that I see what this book has evolved into, I'm glad I didn't agree to write it! I believe Peter Gregory and Larry Miller did it more justice than I ever could have. Check it out.
Read More
Posted in certifications, cissp, cool products, recommended books | No comments

Wednesday, 8 August 2012

Pressure washer v. university data center...guess who wins?

Posted on 16:33 by Unknown
Oops, Georgia State University forgot to check their data center for leaks. Okay, I'm not going to pick on my friends at GSU. In their defense you cannot - in any way, shape, form or fashion - predict or plan for every possible disaster recovery/business continuity scenario or outcome. But a threat exploiting a weakness that knocks phones and Internet access out for five hours, this is a great example. Add it to your list.
Read More
Posted in business continuity, stupid security | No comments

Tuesday, 24 July 2012

This week's webcast on common sense security

Posted on 13:29 by Unknown
Join me and Phil Owens of GFI tomorrow (Wednesday July 24, 2012) as we wax poetic about what it really takes to have a reasonable layered security defense against malware:

Defense in Depth: The Layered Approach to IT Security 
Crashed systems, data theft, decreased productivity, revenue loss, reputation loss – today’s malware threats can cause critical damage to your business. IT professionals, now more than ever, need a method of in-depth protection to effectively defend their information, devices and network. They need layered security.

Watch this Ziff Davis B2B webcast to determine if your current security measures are doing enough. Phil Owens of GFI and independent information security expert Kevin Beaver of Principle Logic will provide insight into:
  • How malware can impact your business
  • The latest malware attack vectors
  • The importance of employee education
  • Why you need layered security
I hope you'll consider joining in! You can register here.


Read More
Posted in Kevin's security content, malware, message from Kevin, webcasts | No comments

Interesting quote on human psyche that relates to infosec

Posted on 05:52 by Unknown
I just saw the following quote from publisher Malcolm Forbes that underscores the very essence of the problems we see in information security, business and life in general:

"Too many people overvalue what they are not and undervalue what they are."

Indeed, so many people want to control or break down (they're one in the same) others because their own lives are out of control. They simply don't believe in themselves. Like how exercise and good nutrition translate to healthy living, the problems we face are solved by simple means. It's a matter of choice.
Read More
Posted in great quotes, information security quotes, personal responsibility, scary stuff, security leadership, stupid security, thinking long term | No comments

Tuesday, 10 July 2012

Posted on 09:00 by Unknown
With all the recent hype and hoopla over Windows 8 and Server 2012, I thought I'd throw in my two cents into the Microsoft analysis arena...here are some recent pieces I've written that you may be interested in:

Thoughts and considerations around the forthcoming System Center 2012 Configuration Manager

Why the simple Windows 8 Metro interface may not benefit users

Microsoft Security Compliance Manager enhances desktop security

A first look at Microsoft Office 15 features

BitLocker's improvements leave gaps to be aware of

You know the deal...be sure to check out principlelogic.com/resources for links to all of my information security whitepapers, podcasts, webcasts, books and more.Enjoy!
Read More
Posted in bitlocker, compliance, cool products, full disk encryption, Kevin's security content, laptop encryption, office, sccm, Windows, windows 8 | No comments

Monday, 9 July 2012

What NTOSpider offers the appsec world

Posted on 11:52 by Unknown
I feel like I've said it a million times: you cannot rely on just one Web vulnerability scanner. There are simply too many vendors doing too many checks across too many websites and applications. The complexity of what needs to be tested is enormous not to mention the quality of the Web vulnerability scanners on the market (tip: you get what you pay for). Well, NTObjectives' NTOSpider is a perfect example of a tool that's going to find a few, sometimes tons, of additional things that the competition won't uncover. Nice, but it's such a frustrating reality for those of us working in application security.

Having used NTOSpider off and on for nearly a decade, I've found its interface to be very usable. It has some niceties that none of the other scanners have. But, like so many others, it has its frustrating quirks and shortcomings - a few of which I'll include in my upcoming post about "the perfect Web vulnerability scanner".

One of the things that stands out to me is NTOSpider's ability to crawl, effectively, through just about any type of website or application. I spent years with another scanner failing me on some select applications and NTOSpider tackles them with no complaints or questions asked. NTOSpider's reporting is awesome too...lots of different views are available right inside the UI and it also generates PDFs and HTML versions for you to divvy up among the stakeholders. Speaking of reporting, NTOjectives'  recently announced NTOEnterprise - an add-on that looks promising for bigger shops and those looking to do more in-depth vulnerability management.

NTOSpider has turned up a fair number of false positives for me over the years especially around weak passwords discovered and SQL injection. Even the built-in SQL Invader tool confirmed they didn't exist. These issues have lessened recently but they still take time to validate...and if you've done this enough you know that it's always a buzz kill to see the mac daddy exploits the scanner is alerting to aren't really there after all. It keeps us honest though...and makes us earn our keep. I do hate to think of how many non-technical auditors or compliance managers are running such scans (using NTOSpider or whatever tool) and holding the feet of IT/security/development to the fire for no reason at all.

One of the things I like best about NTObjectives: accountability. Sales and support - even if you need to get top dog Dan Kuykendall involved - are always there and eager to please. You're not going to get that from the big-box guys.

NTOSpider is a good tool to have. If you can afford several Web vulnerability scanners, it should definitely be on your short list. If you go into it with an open mind and an understanding that there is no one best tool, you'll do fine.
Read More
Posted in automated scanner oversights, checklist audits, cool products, penetration testing, security audits, web application security | No comments

Wednesday, 20 June 2012

Want to know the traits of top infosec leaders?

Posted on 10:03 by Unknown
Join me in 24 hours for my webinar with EC-Council (the folks behind the CEH, Certified Ethical Hacker, certification) titled Four Traits of Successful Information Security Leaders.

I'll share with you my experiences and mistakes as an information security leader as well some observations I've made of those at the top of their game over the past 11 years I've spent working for myself. There will be a Q&A at the end to top it all off.

Check it out. There's no charge...you'll just need to sign-up for an account on BrightTALK. Look forward to seeing you there!
Read More
Posted in careers, goal setting, Kevin's seminars, message from Kevin, security leadership, thinking long term, time management | No comments

Tuesday, 19 June 2012

The security conversation is not a one-time deal

Posted on 07:48 by Unknown

Read More
Posted in careers, goal setting, Kevin's videos, security leadership, selling security, thinking long term | No comments

Monday, 11 June 2012

Focus on yourself and reap the rewards in IT & infosec

Posted on 11:47 by Unknown
If you're in to big-picture IT and information security stuff like, say, your career and focusing on what matters, here are some new bits I've written for TechTarget and Security Technology Executive magazine that you may be interested in:

Five habits of highly-successful IT pros


Social networking strategies to further your IT career

Five ways to advance your Windows career

Understanding management gets your IT department what it needs

RSA's look at the big picture

Enjoy! As always, check out principlelogic.com/resources for links to all of my information security whitepapers, podcasts, webcasts, books and more.
Read More
Posted in back to basics, careers, goal setting, Kevin's security content, low-hanging fruit, networking essentials, security leadership, social media, thinking long term | No comments

Thursday, 7 June 2012

The weakness of vulnerability scans that people (sadly) ignore

Posted on 07:24 by Unknown
Those of us who live and breathe information security on a daily basis understand that vulnerability scans are only part of the information security assessment equation. We can't live without them but as I've outlined here we by all means cannot rely on them completely.

I was just speaking with a colleague about this and came up with an analogy for our overdependence on external vulnerability scans in the name of PCI DSS, lack of funds to do it right or whatever the excuse du jour:  Relying solely on basic unauthenticated vulnerability scans to find all the security problems on your network is like depending on a home inspector to check out your new diggs from his automobile on the street. He may be able to find some issues with the porch, roof, siding or driveway - especially if he's got a good set of binoculars - but he's certainly not going to see what's really taking place on the inside. Vulnerability scans are no different, especially in the case of Web applications.

Moral of the story: Don't trust that external vulnerability scans will show you where your network security truly stands. It's shortsighted and will bite you when you least need/expect it. And, if the breach ends up in a lawsuit or going to court, it'll most certainly be brought out by the lawyers and their expert witness that due diligence was started but not performed up to par.
Read More
Posted in automated scanner oversights, compliance, pci 6.6, pci dss, scary stuff, security assessments, security testing tools, stupid security, thinking long term, vulnerability assessments | No comments

Wednesday, 6 June 2012

Great quote that applies to information security

Posted on 08:22 by Unknown
“Follow the path of the unsafe, independent thinker. Expose your ideas to the danger of controversy. Speak your mind and fear less the label of ‘crackpot’ than the stigma of conformity.” 
– Thomas J. Watson, Jr.

I've found that it's a great way to live your life too. :)
Read More
Posted in careers, great quotes, information security quotes, personal responsibility, security leadership, thinking long term | No comments

Monday, 28 May 2012

Thank a veteran

Posted on 03:46 by Unknown
Saw this, unsure who wrote it, but I really like it:
  • It is the veteran, not the preacher, who has given you freedom of religion.
  • It is the veteran, not the reporter, who has given you freedom of the press.
  • It is the veteran, not the poet, who has given you freedom of speech.
  • It is the veteran, not the protester, who has given you freedom to assemble.
  • It is the veteran, not the lawyer, who has given you the right to a fair trial.
  • It is the veteran, not the politician, who has given you the right to vote.
  • It is the veteran, who salutes the Flag, who serves under the Flag, whose coffin is draped by the Flag.
Let us not forget why we have what we have. Happy Memorial Day.

Read More
Posted in great quotes, message from Kevin | No comments

Monday, 21 May 2012

Real-life example of people not seeing the big picture

Posted on 05:54 by Unknown
The inability to think long-term, to see the bigger picture consequences of our choices, is no doubt at the root of most information security problems. Here's an example of what I'm talking about...what's wrong with this car?




No, this isn't a race car with Hoosier racing slicks...it's a street car owned by someone working or shopping at a Wal-Mart who has chosen to drive with improper equipment. Like many people who choose to ignore information security problems, this poor sap won't know what hit him the next time he crosses standing water during a downpour.

We must think before we act or we're doomed to endure the consequences of our choices.
Read More
Posted in careers, goal setting, humor, personal responsibility, scary stuff, security leadership, stupid security, thinking long term | No comments

Friday, 18 May 2012

New video: My take on #BYOD - It's something you can't ignore

Posted on 14:55 by Unknown

Read More
Posted in | No comments

Tuesday, 15 May 2012

IT's malignant narcissism and what you can do to rise above the noise

Posted on 07:23 by Unknown
IT department optimism does not translate into IT department budget. That's what Jonathan Feldman wrote about in this Information Week piece. Their study provides lots of interesting insight into how many working in IT see things compared to, well, the rest of the business. I'm not surprised.

While we're on the subject, I've recorded a video on IT's role in fixing this problem and wrote a new piece for TechTarget's SearchWinIT.com site on why understanding management gets your IT department what it needs.

If you're going to move ahead - heck, even just survive - in IT, it's critical to understand how the desire for gain or fear of loss are at the basis of every "sale" you make. Stop thinking of yourself as an IT person and, instead, as a business professional who's helping the business move forward and accomplish its goals by leveraging IT.
Read More
Posted in careers, communication, scary stuff, security leadership, selling security, thinking long term | No comments

Friday, 11 May 2012

Web application security assessment war stories

Posted on 03:43 by Unknown
I spend a lot of time performing Web security assessments and every project is a neat learning experience for me. I'm always eager to share my Web security war stories, what to do and what NOT to do so here are some new pieces you may be interested in...From exploiting Web vulnerabilities to IT geek speak and a bunch of stuff in between, I hope there's something here for you:

The Value of Web Exploitation

Web Application Firewalls and the False Sense of Security They can Create

Not All Web Vulnerabilities Are What They Appear to Be

The One Web Security Testing Oversight You Don’t Want to Miss

IT Geek Speak and What Management Really Needs to Hear


Enjoy!

As always, check out principlelogic.com/resources for links to all of my information security whitepapers, podcasts, webcasts, books and more.
Read More
Posted in application firewalls, automated scanner oversights, careers, Kevin's security content, penetration testing, security leadership, security testing tools, web application security, web server security | No comments

Thursday, 10 May 2012

New video: The things my most secure clients have in common

Posted on 07:21 by Unknown

Read More
Posted in Kevin's videos, personal responsibility, risk management, security leadership, security management, thinking long term | No comments

Quote on reasoning with the unreasonable and why character is critical

Posted on 05:42 by Unknown
Be it executives with their heads in the sand over security or know-it-all propeller heads who can't see the big picture of business risk, I've found that you just can't reason with the unreasonable. Here's something that Robert Schuller said that underscores the issue and helps us understand why being the bigger person is most important:

"People are unreasonable, illogical and self-centered. Love them anyway. If you do good, people will accuse you of selfish ulterior motives. Do good anyway. If you are successful, you will win false friends and true enemies. Succeed anyway. Honesty and frankness make you vulnerable. Be honest and frank anyway."

Speaking of principles and character, I read a recent article by Larry Reed in the Atlanta Business Chronicle titled Character: Nothing is more important. This one piece sums up what I believe it truly takes to be successful in IT and information security. I especially like the part where Mr. Reed says "Integrity is more important than all the degrees you’ve earned, all the management courses you could possibly take, and all the knowledge that you could absorb on any subject." I couldn't agree more.


Focus on these things and you'll see that there's a vast conspiracy out there to make you successful.
Read More
Posted in careers, great quotes, information security quotes, personal responsibility, security leadership, stupid security, success, thinking long term | No comments

Thursday, 3 May 2012

Video: The (partial) solution to information security denial

Posted on 13:11 by Unknown

Read More
Posted in Kevin's videos, personal responsibility, security leadership, selling security, stupid security, thinking long term | No comments

The funny thing about iPhones & airplane toilets

Posted on 05:33 by Unknown
My Delta co-passengers and I recently had the opportunity to experience a near 1-hour flight delay due to, none other than, some dude dropping his iPhone into the aft toilet on our fancy Boeing 757. I'm not making this up...

Yep, there we were sitting at the gate and this guy comes up to the flight attendants to ask for some help getting his iPhone out of the crapper. Yuck! The captain got involved, and then maintenance, and then all the ensuing paperwork.

This incident reminded me of when the authorities shut down an interstate when some dude is threatening to jump from a bridge above. Imagine the economic impact. Few think about that...But thanks to the ever so brave maintenance man, the passenger ended up getting his "$900" iPhone back. He said he had insurance on it and needed it to be able to get a new one. Reasonable argument I suppose..if you're a hazmat kinda guy.

I feel for the poor sap at AT&T who takes it back not knowing where it's been.

I bring this up because it's a scenario that could very well play out in your enterprise. I'm not so sure that anything could be recovered from a phone after being immersed in a toilet...but you never know, especially if the phone has a Micro SD card for external storage (i.e. BlackBerry & Android-based devices).

Will your employees know what to do in this type of situation? Will it matter if the device is personally-owned versus business-owned? You need to develop a stance on this and integrate into your mobile security policy. Oh, and let everyone know about it. Will you need to enact any sort of incident response procedures or data breach notification (I can hear it now: "Sorry Mr. or Mrs. Customer, We've had a craptacular situation involving your data that you need to know about...").

It was a funny situation. Crappy jokes aside, this is certainly something to think about for your own business.
Read More
Posted in data breaches, data destruction, humor, incident response, mobile security, security policies, training, user awareness | No comments

Wednesday, 25 April 2012

My webcast on software source code analysis

Posted on 17:23 by Unknown
Here's a recent webcast I put together with the folks at Checkmarx (makers of a dandy source code analyzer) that you may be interested in:

The business value of partial code scanning

Enjoy!

Read More
Posted in cool products, Kevin's security content, source code, source code analysis, web application security, webcasts | No comments

Monday, 23 April 2012

How are you spending your time?

Posted on 07:06 by Unknown
Not long ago I had a conversation with a colleague of mine who's also a consultant. We were discussing the topic of how, even with today's shaky economy, people still goof off on the job as if they had nothing to lose.

Are you seeing this too?

I wrote about this phenomenon over three years ago. Funny how not much changes internally given all the external forces pressing down on us.

Not being willing to do whatever it takes to become - and remain - a valuable asset to your business is a sure-fire way to get axed when big decisions are being made. Trust me, I learned this lesson the hard way working for a previous employer before I went out on my own.

I recommend continually asking yourself: What's the most valuable use of my time? I often find the answer to be something else other than what I'm currently doing. We all struggle with this. We're only human. It's the people who learn and overcome that move to the head of the pack.

In case you're interested, check out the additional articles I've written on time management and IT careers and even a couple of audiobooks that can help you boost your current career situation.

Read More
Posted in careers, personal responsibility, thinking long term, time management | No comments

Monday, 16 April 2012

Basic features of WebInspect - the kind of stuff great scanners are made of

Posted on 05:10 by Unknown
Wondering what helps minimize the pain, stress and time required to run effective Web vulnerability scans? It's the things you can see in the toolbar of HP's WebInspect:



Start/Resume, Pause - because you're going to need to pause and resume your scans at some point.
Rescan - because you're going to want to re-run the scan again or re-test for the flaws uncovered previously.
Compare - because you're going to have a need to compare results for remediation validation testing, etc. eventually.

If you do this work enough, these types of vulnerability scanner features can have tremendous payoffs over the long haul.
Read More
Posted in cool products, security scans, security testing tools, web application security, WebInspect | No comments

Monday, 9 April 2012

Video: Here's the one thing you can do to improve #infosec right now

Posted on 10:19 by Unknown

Read More
Posted in careers, Kevin's videos, personal responsibility, success, thinking long term | No comments

Sunday, 8 April 2012

Disk encryption for HIPAA + HITECH & why BitLocker may not be the solution

Posted on 05:02 by Unknown
I'm finally back in the swing of things after taking some time off for Spring Break. I hope you're enjoying your Spring as well.

Here are two articles I've recently written about full disk encryption...arguably the greatest missing link in any given business's information security program.

Things you need to think about regarding disk encryption and data protection for HIPAA and HITECH

BitLocker’s improvements leave gaps to be aware of


Enjoy!

As always, be sure to check out www.principlelogic.com/resources.html for links to all of my information security whitepapers, podcasts, webcasts, books and more.
Read More
Posted in bitlocker, compliance, data at rest, drive encryption, full disk encryption, hipaa, hitech, Kevin's security content, mobile security | No comments

Saturday, 31 March 2012

Video: Don't worry about your title, focus on this instead

Posted on 17:25 by Unknown
My thoughts on why you need not worry about how people address you. [Hint: it's not about you.] There are bigger things to be concerned with.


Read More
Posted in careers, Kevin's videos, personal responsibility, security leadership | No comments

Wednesday, 28 March 2012

This is your crazy JetBlue captain speaking

Posted on 04:24 by Unknown
Anyone is capable of doing anything...that's what comes to mind when I think about the JetBlue captain going mad on a flight yesterday. Here's what I know...Just because someone has passed a background check, has a good references and has created a good track record for himself doesn't mean he's not capable of flying off the hook and doing bad things. This applies to pilots as in this situation and it applies to your own users when it comes to information security.

Sadly, as with doctors, law enforcement officers and the like, we typically hold pilots on pedestals without question. These are the people we look up to assuming they're well put together and always doing good things. This is not always true. We have to trust, but verify...yet still, we never really know. I'm just glad the JetBlue co-pilot and passengers executed a worthy backup plan. Great reminder we always need a Plan B...especially today if you work in JetBlue's PR department.
Read More
Posted in incident response, internal threat, risk analysis, scary stuff, user awareness | No comments

Thursday, 22 March 2012

Don't underestimate the value of firewall rulebase analysis

Posted on 09:16 by Unknown
Are firewalls sexy? No...but you must understand that they're an integral part of your overall information risk equation. From configuration flaws to rulebase anomalies to overall system inefficiencies, your firewall rulebases can make or break security, business continuity and other critical parts of your IT operations.

Last week, AlgoSec's Nimmy Reichenberg and I recorded a webinar titled How to Automate Firewall Operations, Simplify Compliance Audits and Reduce Risk that you may want to check out. It's not salesy or filled with marketing fluff. It's more of us having a conversation about some common firewall security and management oversights and what needs to be done to rein in the problems.

I'm a believer in firewall rulebase optimization. I've seen mis-managed and undersecured firewalls do everything from take down an entire enterprise's operations for hours on end to making critical network flaws open to the outside world. I'm working on such projects right now and I'm pretty sure every network - every firewall - that hasn't been properly reviewed and that isn't being properly managed has these same risks present at this very moment.

Check out our discussion and see if you think there's a fit for better firewall oversight in your enterprise.You can't change what you tolerate in IT...acknowledge the issues that are hidden in your environment and vow to do something about them once and for all.
Read More
Posted in application firewalls, change management, compliance, firewalls, Kevin's seminars, network complexities, network security, security management, webcasts | No comments

An interesting Microsoft tool to help with data classification

Posted on 07:54 by Unknown
Have you ever heard of Microsoft's Data Classification Toolkit for Windows Server 2008 R2? Me either. But it may be worth taking a look at. The lack of data classification and proper retention is at the core of many IT risks not to mention legal and compliance issues. You can't secure (or protect, or retain, or dispose of) what you don't acknowledge.

If the Data Classification Toolkit is anything like Security Compliance Manager, it may well be worth checking out. It's free...and if you don't have any other tools or means to get your arms around data classification, why not start with it? Could provide a good segue into better security controls as a whole.
Read More
Posted in compliance, cool products, information classification, legal, risk analysis, risk management, security management, unstructured information | No comments

Monday, 19 March 2012

Neat tools to seek out sensitive files on laptops & websites

Posted on 18:51 by Unknown
"Oh yeah, I forgot about all of those files." I've never had a security tool lead to these predictable words regarding sensitive files being stored on unencrypted laptops as much as Identity Finder has. You may have seen Identity Finder in my previous post and related articles and presentations where I've mentioned or demonstrated it. Identity Finder is a commercial product that IT and information security professionals can use to uncover files that are at risk on under-protected laptops - even the entire enterprise.

 Here's a quick peek of what Identity Finder can uncover on a laptop:


Pretty eye-opening, huh? Especially if you find all of this information on an unencrypted laptop.

Check out Identity Finder. It's one of those good bang for the buck tools that can help you with information discovery, classification, leakage prevention or just to simply make the case that PII or intellectual property are not being protected the way they should be.

There's a related tool I recently came across that you should check out as well called FOCA. FOCA (more specifically FOCA Free) is a data gathering tool you can use to seek out sensitive files on websites you may be testing. It's got a few little quirks but, compared to so many other free tools I try, it actually works. Here's a screenshot of its interface:



I'm convinced that those of us in IT and infosec are no different than surgeons, carpenters or race mechanics. If we don't have the right tools for the task, we're not going to accomplish all we need to accomplish. Consider adding Identity Finder - and FOCA - to your arsenal. They can't hurt!
Read More
Posted in compliance, cool products, data leakage, intellectual property, penetration testing, pii, security testing tools | No comments

Thursday, 15 March 2012

Flaws, compliance and the Cybersecurity Act of 2012

Posted on 02:11 by Unknown
Here are some new pieces I've recently written that you may be interested in...big things in security we need to have on our radar:

Six Security Flaws on Your Network Right Now

Find the Most Flaws By Balancing Automated Scans with Manual Analysis


Compliance is just the beginning

New and not-so-new security twists in the Cybersecurity Act of 2012

Enjoy!

Be sure to check out www.principlelogic.com/resources.html for links to all of my information security whitepapers, podcasts, webcasts, books and more.
Read More
Posted in back to basics, compliance, cybersecurity bill, Kevin's security content, low-hanging fruit, network complexities, scary stuff, stupid security | No comments

Wednesday, 14 March 2012

My upcoming webcast with Checkmarx: How to Use Source Code Analysis to Improve Information Security

Posted on 10:32 by Unknown
Join me next week, Thursday March 22, for a quick webcast where I'll be co-presenting on the topic of source code analysis and how it can improve your information security over time.

I'm convinced that source code analysis is one of the missing links in the overall security process. As I say all the time: you cannot secure what you don't acknowledge. Ignoring security flaws at the source can be bad for business. Performing source code analyses, I've found Web application flaws like hard-coded cryptographic keys and password string, SQL injection and file manipulation...none of which external penetration testing tools uncovered.

This stuff is important. We're only asking for 30 minutes of your time. I hope you'll join us. You can register here.
Read More
Posted in cool products, message from Kevin, presentations, source code, source code analysis, web application security, webcasts | No comments

My Atlanta CDW/TechTarget seminar

Posted on 10:10 by Unknown
We had a friendly and larger than expected crowd at our event CDW/TechTarget information security seminar yesterday. Thanks to those who came out!

My favorite part of these events is learning new ideas from the participants and the other speakers. In this ever-changing world in which we work, it's hard to keep up and there's certainly no way to know it all. Every little nugget helps.

Looking forward to an even better event next week in Chicago!
Read More
Posted in Kevin's seminars, message from Kevin, presentations | No comments

Friday, 9 March 2012

My upcoming webcast on firewall management

Posted on 08:36 by Unknown
Join me and AlgoSec's Nimmy Reichenberg next week for a unique discussion on strategies for improving firewall management.

We all know it's the elephant in the room...Today's enterprises have firewalls that are so complex and so fragile yet no one's really taking care of them. Any processes that do exist around rule management, rule changes and firewall risk analysis are often manual - and oh so painful.

I know, I know, firewalls are not all that sexy any more. And why bother them if they're running well and doing what they need to do?

It's not that simple...From strategies to lessons learned, Nimmy and I will share with you just what you need to know to get your firewall house in order. Will you join us? It'll just take an hour of your time and the payoffs can be tremendous.

Check out the following link for more info and to register:
5 Strategies to Improve Firewall Management: How to Automate Operations, Simplify Compliance Audits and Reduce Risk 

Hope to "see" you there next week!
Read More
Posted in change management, compliance, cool products, firewalls, network complexities, presentations, risk management, security management, webcasts | No comments

Thursday, 1 March 2012

My final takeaway from #RSAC

Posted on 05:32 by Unknown
I said my farewell to the RSA Conference Tuesday evening but had some final thoughts about the show that I wanted to share with you.

In addition to the keynotes I talked about, I attended a mock trial session involving malware, a digital certificate acquired for ill-gotten gains, and a healthcare company that ignored all things HIPAA (heard that a million times!) as well as a session by HP's Jacob West (an excellent presenter if you ever get a chance to see him) on mobile application security. Both were very well presented.

I had a chance to mingle with long-time colleagues and clients (many of which I met in person for the first time) on the show floor. It was also neat to see my book in the RSA bookstore - very humbling seeing it mixed in with some of the big sellers in our field.

Here's my big takeaway from everything that I saw and heard...it's something you've heard me say before and I'll continue saying it until I retire. It was echoed in every presentation I attended and every bit of marketing literature I read. Be it the overall network, databases, mobile apps, people - whatever - you cannot secure what you don't acknowledge. And so many of us are not acknowledging all the things that matter. So step back, see the big picture, fix the low-hanging fruit (the home-runs), put the proper tools and processes in place and then dig in further over and over again...never letting up.


Overall a really cool experience...you've got to go to the RSA Conference next year if you can.
Read More
Posted in back to basics, conferences, low-hanging fruit, message from Kevin, RSA 2012, thinking long term | No comments

Tuesday, 28 February 2012

Video: #RSAC 2012 is off and running

Posted on 10:34 by Unknown
I'm live at the RSA Conference and here are my thoughts on the first two keynotes along with why you need to come to this show.


Read More
Posted in careers, conferences, Kevin's videos, message from Kevin, security management, thinking long term | No comments

Monday, 27 February 2012

Live from #RSAC: Cloud computing's got some kinks (but you knew that)

Posted on 10:36 by Unknown
I'm attending the RSA Conference this week and just sat through a panel discussion on cross-jurisdictional issues in the cloud. It was part of the Cloud Security Alliance Summit 2012.

Here's what I heard: there are tons of considerations around the management, access and even the e-discovery personal data in the cloud...lots of variables and just as many things still up in the air. I'm convinced that being an information privacy and security savvy attorney is a solid - and likely most lucrative - career paths that IT professionals could take right now.

One of the audience members (apparently a founder of the Unified Compliance Framework) asked the panel why we needed yet another group (the Cloud Security Alliance) establishing yet another set of information security standards when 99.99% of everything that's being touted today is already part of some other regulation, standard or framework. I completely agree and didn't hear any compelling explanations...Everyone wants their piece of the pie I suppose. 

Read More
Posted in cloud computing, compliance, RSA 2012, security standards | No comments

Video: Seeing the big picture in information security

Posted on 07:13 by Unknown
Little has been written about this in the context of information security but it's something you've go to consider in every decision you make:


Read More
Posted in Kevin's videos, risk management, security leadership, security management, thinking long term | No comments

Friday, 24 February 2012

CDW-TechTarget seminars are back this year - join me in Atlanta soon

Posted on 03:09 by Unknown
Great news - I'll be speaking at the CDW-TechTarget roadshows again this year! Our first show kicks off in Atlanta on March 13th and then we start zig-zagging across the country every few weeks until late September.

For most of the shows I'll be giving two presentations:
Adapting Your Old-School Network Security Agenda to Today's New-School Security Challenges
...and:
Ensuring Security Controls in an Anytime, Anywhere Access Environment

There will also be vendor expert sessions and a panel discussion at the end of the morning that I'll be moderating. You'll be out of there by lunchtime.

At a couple of the shows, we'll have two tracks running simultaneously so the day will be a bit longer (lunch included) and I'll be presenting an additional session titled Building Security (and Confidence) in the Cloud.

I hope you'll be able to join me. We got a lot of great feedback on these events last year and I know this year will be even better.

Check out the locations, dates and registration form here. There's no charge to attend if you're selected. See you in Atlanta in two and a half weeks!





Read More
Posted in cloud computing, compliance, Kevin's keynotes, Kevin's seminars, message from Kevin, network security, presentations | No comments

Sunday, 19 February 2012

Got compliance on your mind?

Posted on 13:53 by Unknown
I figured you did...it seems everyone does these days. However you look at compliance - be it a threat, a security enabler or just a pain in the rear-end - here are some new pieces I've written that may help:

Our dangerous overdependence on IT auditing

Compliance considerations when disposing old equipment

How Windows Server 8 can help with compliance


Enjoy!

Be sure to check out www.principlelogic.com/resources.html for links to all of my information security whitepapers, podcasts, webcasts, books and more.
Read More
Posted in checklist audits, compliance, disposal, Kevin's security content, recycling, security audits, windows 8 | No comments

Monday, 13 February 2012

Is it really possible to get users on board with security?

Posted on 17:02 by Unknown
I think so. Here's how.

I don't think that user awareness and training is THE answer to information security like many others believe. I do know that you shouldn't let another year pass without getting your users on board with what you're doing.
Read More
Posted in security awareness, security leadership, selling security, user awareness | No comments

Sunday, 12 February 2012

SQL injection cheatsheet & tips for getting management on board

Posted on 16:41 by Unknown
Here's a neat "cheatsheet" on SQL injection by NTObjectives that outlines some common attack strings, commands and so forth. Their SQL Invader SQL injection tool is worth checking out as well.

If you're having trouble selling management on the dangers of SQL injection, check out this piece I wrote about it not long ago:
SQL Injection – The Web Flaw That Keeps on Giving

Ten Ways to Sell Security to Management

Happy hacking!
Read More
Posted in careers, cool products, Kevin's security content, selling security, SQL injection, web application security | No comments

Friday, 10 February 2012

Video: The one infosec skill you need to be working on

Posted on 05:55 by Unknown
Develop and maintain this one skill and you'll position yourself to be a much more valuable information security professional:
 


Read More
Posted in careers, compliance, Kevin's security content, Kevin's videos, legal, security leadership | No comments

Thursday, 9 February 2012

Video: My new whitepaper on advanced malware and how Damballa Failsafe fits in

Posted on 08:31 by Unknown
Introduction to the threat we're facing and my new whitepaper The Malware Threat Businesses are Ignoring and How Damballa Failsafe Fits In:

 
Read More
Posted in cool products, hacking, Kevin's security content, Kevin's videos, malware, scary stuff, whitepapers | No comments

Wednesday, 8 February 2012

Video: My new whitepaper on SQL Server security threats & compliance

Posted on 11:30 by Unknown
Check out my new whitepaper The SQL Security Security Threat - It's closer than you think sponsored by Idera:
Read More
Posted in compliance, cool products, database security, internal threat, Kevin's security content, Kevin's videos, sql server, whitepapers | No comments

What's it going to take for police departments to secure their websites?

Posted on 09:20 by Unknown
Here's yet another story about a police department website being compromised by criminal hackers. When a regular citizen's home address is exposed, that's one thing. But when the addresses of police chiefs are published online, that opens up an entirely new set of risks for their personal safety. Sad. Hey, at least the police chiefs I know are armed and well-trained experts. Would be pretty foolish to try and attack them on their home turf.

As I've mentioned before, you have to test ALL of your websites - marketing site, everything. If it's got an IP address or a URL it's fair game for hacking.
Read More
Posted in back to basics, low-hanging fruit, penetration testing, scary stuff, stupid security, web application security | No comments

Introducing my information security YouTube channel - PrincipleLogic

Posted on 04:49 by Unknown
Check out my new YouTube channel (www.youtube.com/PrincipleLogic):



I'm really excited about this. More videos coming soon.

I plan to post video blogs once or twice a week so be sure to subscribe on YouTube or via my RSS feed.

Enjoy!
Read More
Posted in Kevin's security content, Kevin's videos, message from Kevin | No comments

Tuesday, 7 February 2012

If we can't even get beyond our own unhealthy lifestyles...

Posted on 04:57 by Unknown
I'm a true believer in maintaining a healthy lifestyle. Exercising, eating well and so on. There's that equation that all of us are well aware of: burn more calories than you take in and you'll lose weight. Then, once we get to our ideal size, we just need to maintain a good balance of calories and exercise and we're golden. Sounds simple enough.

I subscribe to a couple of different health-related newsletters from Consumer Reports and the Mayo Clinic and, putting the occasional new research aside, it seems the content in these newsletters is mere rehashing of the exercise more, eat less way of life. The health experts claim that's how most of us, by and large, will stay healthy. Makes sense to me.

The thing is, I'm not as healthy as I could be and I know we have a serious obesity and diabetes problem in America and other parts of the world. Unhealthy people are everywhere. But where's the breakdown?

With everything else being equal (socioeconomic status, self-esteem, genetics and the like) we get busy. Life gets in the way. We've got jobs, kids and all the other things of adulthood that we're now responsible for (and often feel woefully unprepared for, right!?). Even the people with the greatest  intentions of being healthy can't seem to maintain a healthy lifestyle. [notice how the New Year's Resolutions are fading away and gyms are thinning out now that it's February?]

I look at this issue and wonder to myself, how can we possibly expect people (management, regular employees, IT staff - whoever) to give their best to information security when these same folks struggle to assess risks related to their own bodies? Our health is all we've got. If we can't take that seriously, I'm not so sure we're ever going to get true buy-in and support for something as seemingly unimportant as information security.

Like how automobile safety has evolved over the decades, maybe things will come around and we'll start seeing truly "healthy" information security initiatives. The human mind is complex. It's a long road ahead. I remain hopeful.
Read More
Posted in careers, personal responsibility, risk analysis, scary stuff, security leadership, thinking long term | No comments

Monday, 6 February 2012

My new material on Web application & website security

Posted on 13:24 by Unknown
Here are several new pieces I've written on Web site/application security. Lots of angles and considerations:

There’s more to web security than meets the eye

Web passwords are often the weakest link

To validate or not, is that the question?

Protecting FTP services running on your Web server

The critical Web-based systems that are going untested and unsecured

Good Web Security Tools and Why They Matter

Why you need intruder lockout

Web security is like the layers of an onion

And, probably my favorite (a big, big security oversight):
You need to test your marketing site too!

Enjoy!

You know the deal....Be sure to check out www.principlelogic.com/resources.html for links to all of my information security whitepapers, podcasts, webcasts, books and more.
Read More
Posted in back to basics, compliance, hacking, Kevin's security content, low-hanging fruit, passwords, security testing tools, stupid security, web application security, web server security | No comments

Tuesday, 31 January 2012

Where's your information security focus?

Posted on 06:55 by Unknown
You cannot change facts (i.e. the industry your business is in, the regulations it's up against, the type of sensitive information you're responsible for managing, etc.) but you can change problems (i.e. user behavior, wayward goals, management not on board with security, etc. ).

As the philosopher James Burnham once said:
"If there is no alternative, there is no problem." 

In the case of information security, there are tons of alternatives to the issues we face. It's up to us to focus on what counts so we can eventually make a difference.
Read More
Posted in great quotes, information security quotes, personal responsibility, security leadership, thinking long term | No comments

Friday, 27 January 2012

You cannot multiple security by dividing it - Infosec's relationship with Socialism

Posted on 05:26 by Unknown
I'm not much into urban legends and the like but came across this bit the other day and it really made me think. What a great analogy that impacts all of us both personally and professionally with some interesting information security and compliance tie-ins that I see all the time:

An economics professor at a local college made a statement that he had never failed a single student before, but had recently failed an entire class. That class had insisted that Obama's Socialism worked and that no one would be poor and no one would be rich, a great equalizer. 

The professor then said, "OK, we will have an experiment in this class on Obama's plan". All grades will be averaged and everyone will receive the same grade so no one will fail and no one will receive an A.... (substituting grades for dollars - something closer to home and more readily understood by all). After the first test, the grades were averaged and everyone got a B. The students who studied hard were upset and the students who studied little were happy. As the second test rolled around, the students who studied little had studied even less and the ones who studied hard decided they wanted a free ride too so they studied little..The second test average was a D! No one was happy. When the 3rd test rolled around, the average was an F. 

As the tests proceeded, the scores never increased as bickering, blame and name-calling all resulted in hard feelings and no one would study for the benefit of anyone else. To their great surprise, ALL FAILED and the professor told them that Socialism would also ultimately fail because when the reward is great, the effort to succeed is great, but when government takes all the reward away, no one will try or want to succeed. It could not be any simpler than that. Remember, there IS a test coming up. The 2012 elections. 

These are possibly the 5 best sentences you'll ever read and all applicable to this experiment: 
  1. You cannot legislate the poor into prosperity by legislating the wealthy out of prosperity. 
  2. What one person receives without working for, another person must work for without receiving. 
  3. The government cannot give to anybody anything that the government does not first take from somebody else. 
  4. You cannot multiply wealth by dividing it! 
  5. When half of the people get the idea that they do not have to work because the other half is going to take care of them, and when the other half gets the idea that it does no good to work because somebody else is going to get what they work for, that is the beginning of the end of any nation. 

Not that the big government Republicans are a lot better...The reality is we Americans had better wake up, smell the "change" we're stepping in and learn that no politician, Democrat OR Republican, can make our lives better...only WE can make that happen.

Be it information security, compliance or your personal live....as Og Mandino once said (favorite quote of all time): "Use wisely your power of choice."
Read More
Posted in government intrusion, government regulations, great quotes, information security quotes, personal responsibility, scary stuff, security leadership, stupid security, thinking long term | No comments

Thursday, 26 January 2012

Evanta CISO event and why St. Jude's has it right

Posted on 12:16 by Unknown
This week I had the opportunity and privilege to serve as a panelist on mobile security at the Evanta CISO Executive Summit in Atlanta. What a neat event...it wasn't just another infosec show. It was unique in its focus and well run by Corrine Buchanan and Mitch Evans who always seemed to have a smile on their faces - something we don't see enough of at these types of shows.

Another thing was a St. Jude's Children's Hospital video they played featuring Marlo Thomas talking about her father's work with the hospital. She said something about the hospital regarding its mission that stuck in my mind: "Don't just treat kids. Let's try to figure out what makes them sick."

Great approach with an interesting information security tie-in: Don't just throw technologies and policies at security...find out what's actually at risk. Indeed, we have to be smart in using the resources we're given.
Read More
Posted in cool sites, information security quotes, kevin's panels, Kevin's seminars, security leadership | No comments

Wednesday, 25 January 2012

Complacency, meet APT – How basic oversights lead to complex malware infections

Posted on 11:03 by Unknown
Low-hanging fruit – that is, the missing patches, default passwords, lack of full disk encryption and so on present in practically every environment – is something I’ve ranted about time and again because there’s no reason to have it on your network. Why? Well, for one thing, rogue insiders may just exploit it for ill-gotten gains. But even worse, low-hanging fruit can be the target of malware exploitations that you’re not prepared to take on. You see a few missing patches and unhardened endpoints combined with users gullible enough to click whatever’s placed on their screens and you’ve got yourself the recipe for disaster.

Low-hanging fruit can turn from “Yeah, I need to get to that stuff…” to “Oh crap, all of our workstations are being controlled by someone on the other side of the world”.

Recent shifts in IT like consumerization, mobility and the desire for instant gratification when it comes to computer and Internet access have made these threats even more formidable. Users are indeed going to do what they want to do. In many cases, management will proudly back them up – even if they have no clue about the long-term impact to the very business they’re responsible for running.

Built-in security controls provide an opportunity for us to save time, effort and money keeping our systems in check without having to spend a dime more than we need to. That said there are certain security controls that operating system and hardware vendors haven’t mastered. One in particular is security controls designed to help with APTs and advanced malware. It’s just not possible to get the specialized protection out of the box from the mainstream vendors that you’re going to get with a the niche technologies I talked about my recent paper The Malware Threat Businesses are Ignoring and How Damballa Failsafe Fits In.

It’s no different than how I buy special tires and brake pads for my race car. When there’s a specific need, odds are the stock equipment just won’t cut it.

One of the most damaging misconceptions about malware is that the big anti-virus vendors are going to keep endpoints safe. It’s this very mindset that’s gotten businesses into hot water recently. I saw it when working on an incident response project that falls under the Operation Shady RAT umbrella. I think it’s safe to say that traditional anti-virus vendors come nowhere close to protecting your network – especially if such an attack is targeted. In fact, the entire concept of APTs and advanced malware is not very well understood by the IT and information security community as a whole.

How are you supposed to protect against something like this? It's not simple. You’ve got to have the right tools, the necessary documentation and, perhaps most importantly, management that gets it.
Read More
Posted in APTs, incident response, malware, security management, stupid security, thinking long term, whitepapers | No comments

Monday, 23 January 2012

Are your high-tech devices enslaving you?

Posted on 12:05 by Unknown
The late Richard Carlson, author of Don't Sweat the Small Stuff, said:

"It's important to see when your high-tech communication devices actually limit your freedom, enslaving you instead of providing new opportunities for growth."

Wow...How true that is!

Have you ever tried to not look at your emails or answer phone calls when you're out and about with  your family or taking some time to yourself? It's pretty darned difficult but it can be done, if you make it so.

Try it out over the next couple of weeks and you'll see what Dr. Carlson was talking about. You'll give your mind a break and be able to focus on the things that truly matter in life.
Read More
Posted in careers, great quotes, information security quotes, personal responsibility, thinking long term, time management | No comments

Friday, 20 January 2012

My articles & webcasts on hacking, incident response, compliance & IAM

Posted on 09:29 by Unknown
I wanted to share with you a few new pieces I've written for TechTarget and Cygnus on incident response, compliance for systems integrators and the not-so-sexy but all-too-important technology,  identity and access management:

The importance of incident response plans in disaster recovery

Regulatory compliance requirements for security solutions providers

Identity Management’s great bang for the buck

Also, here are some webcasts I recorded for TechTarget, Information Week/Dark Reading and SecurityInfoWatch.com that you may be interested in:
Managing network security threats with an ERM strategy

How Security Breaches Happen and What Your Organization Can Do About It

Building and deploying secure video and access control systems (a.k.a. ethical hacking tips and tricks for video and access control systems)

Enjoy!

As always, be sure to check out www.principlelogic.com/resources.html for links to all of my information security whitepapers, podcasts, webcasts, books and more.
Read More
Posted in | No comments

Executives could learn a lot from Supernanny

Posted on 05:41 by Unknown
We all have a lot to learn from Jo Frost, the Supernanny. In particular, when it comes to information security, IT management, employee computer usage and so on, business executives could benefit a ton. Here's how it'd go:
  1. Create a set of rules.
  2. Enforce your darned rules!
Read More
Posted in personal responsibility, policy enforcement, politics, security management, stupid security, thinking long term | No comments

The role of IT in fighting today’s malware

Posted on 04:52 by Unknown
It seems ever since I wrote my paper The Malware Threat Businesses are Ignoring and How Damballa Failsafe Fits In I’m seeing more and more vendors jump on the bandwagon. Today’s malware impacts everything from the network infrastructure to the endpoint and everyone wants a piece of the pie. I know the market is growing so I can’t blame people for wanting to capitalize on the opportunity.

Vendors aside, what is it that you as an IT professional need to be doing about the threat outside your network and the vulnerabilities inside your network? Being an independent information security consultant and seeing things from an outsider’s perspective, it’s clear to me that most IT shops are, in a grand way, woefully unprepared to fight this threat…much less respond in a mature and professional fashion when a breach and subsequent outbreak occurs.

As I write this post, I’m listening to a song on satellite radio with a chorus that says “If we don’t do it, nobody else will.” Wow, that hits the nail on the head – in a spooky kind of way. Indeed, if you don’t address the advanced malware threat today, indeed, nobody else is going to. Executives on mahogany row won’t. Nor will HR. Software developers are doing their own thing. Even your compliance officer and legal counsel aren’t going to understand the real impact of advanced malware.

You, the IT/information security professional, are going to have to step up and make the case that your business can be – and quite likely is – a target. This means taking the proper steps to:

1. determine your risks
2. get management on board
3. document reasonable policies and an incident response plan
…and, most importantly (and often the missing link):
4. enforcing with the right technologies

Don’t give the bad guys a chance. Do something now. Nobody else will.
Read More
Posted in APTs, hacking, malware, risk analysis, risk management, security management, thinking long term, whitepapers | No comments

Thursday, 19 January 2012

My interview in Hackin9 magazine

Posted on 13:39 by Unknown
If you subscribe to Hackin9 magazine, check out this issue where they feature an interviewed with me about how the information security landscape has changed over the past decade, how you can get started in information security, my take on compliance and more.

If you don't subscribe to Hackin9, it's a great trade rag for technical security pros and (especially?) non-technical IT, security and compliance pros...Putting the occasional typographical errors aside, it's a must-read if you want to stay current on the latest information security trends, exploits and so on.
Read More
Posted in careers, compliance, cool sites, cross-site request forgery, Kevin's interviews, recommended magazines, security management | No comments

Quoted in today's SC Magazine feature story on Symantec

Posted on 10:02 by Unknown
Stephen Lawton wrote today's SC Magazine feature news story on the Symantec source code breach in which I'm quoted.

I provided these quotes late last night and it was interesting timing because I was speaking at local university's AITP chapter yesterday evening and I told my audience that no one is immune from hacking - not even IT and security pros...and obviously not information security companies.

It's a crazy world out there. We have to do our best to prevent the issues but also be prepared in the event something does happen.
Read More
Posted in data breaches, hacking, incident response, Kevin's interviews, kevin's quotes, source code | No comments

Wednesday, 11 January 2012

Great year for my book Hacking For Dummies, 3rd edition

Posted on 07:49 by Unknown
2011 was a great year for me in so many ways. I feel extremely blessed and very lucky. Part of this was related to my book Hacking For Dummies, which is now in its third edition. I knew that sales were up - I believe in large part due to all the speaking engagements I did for TechTarget and others.

Well, I just found out from my publisher that it's safe for me to continue to say that Hacking For Dummies is one of the best selling books on information security...right up there with those big-name titles that some may feel less embarrassed to buy.

Another neat fact: since its inception, Hacking For Dummies has been translated into five additional languages (Portuguese, Estonian, Italian, Simplified Chinese and German).

Very cool.

I can't thank you all enough for your support! This year's going to be even better - stay tuned...
Read More
Posted in Kevin's books, Kevin's seminars, presentations, recommended books | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • How you can get developers on board with security starting today
    Some people - including a brilliant colleague of mine - think security is not the job of software developers . In the grand scheme of things...
  • NetScan Tools LE - a must-have for investigators
    Have you ever had a need to run a program and get a relatively small amount of data just to do your job but end up getting caught in the com...
  • "Top Blogs" list & some home security considerations
    I think I may have found the first sign that my blog is growing and gaining some traction. I've made it to the Top 20 Home Security Blog...
  • Wooo...HIPAA audits are coming & the irony of KPMG's involvement
    I've always believed that compliance is a threat to business [hence why I help businesses take the pain out of compliance by addressing ...
  • Great tool for seeking out sensitive info on your network
    One of the greatest risks in business today is the issue of unstructured information scattered about the network waiting to be misused and ...
  • It's hard being human
    Cavett Robert once said something about character that resonates within information security - especially regarding ongoing management and l...
  • Dario Franchitti and I
    As many of you know I'm a motorsports nut -both as a driver and a fan. This provided the influence for my Security On Wheels logo. Well,...
  • The value of partial code scanning, now
    Check out my new piece on the business value of partial code scanning where I outline why it's better to start your source code analysi...
  • Be it in healthcare or infosec, the short term is for losers
    With all the doctor & hospital visits I've gone (and am still going) through with family members in the past few years, I've com...
  • Live from #RSAC: Cloud computing's got some kinks (but you knew that)
    I'm attending the RSA Conference this week and just sat through a panel discussion on cross-jurisdictional issues in the cloud. It was p...

Categories

  • active directory
  • application firewalls
  • APTs
  • aslr
  • atm security
  • audio programs
  • audit logging
  • automated scanner oversights
  • back to basics
  • backups
  • big brother
  • bitlocker
  • budget
  • business case for security
  • business continuity
  • BYOD
  • car hacking
  • careers
  • certifications
  • change management
  • checklist audits
  • cissp
  • clear wireless
  • cloud computing
  • communication
  • compliance
  • computer glitch
  • conferences
  • consulting
  • content filtering
  • cool products
  • cool sites
  • cross-site request forgery
  • cross-site scripting
  • csrf
  • customer no service
  • cybersecurity bill
  • data at rest
  • data breach laws
  • data breaches
  • data centers
  • data destruction
  • data leakage
  • data protection
  • data retention
  • database security
  • degrees
  • desktop management
  • disaster recovery
  • disk imaging
  • disposal
  • dns
  • document security
  • domino
  • DoS attacks
  • drive encryption
  • e-discovery
  • ediscovery
  • employee monitoring
  • encrypting data in transit
  • encryption
  • end point security
  • ethical hacking
  • exchange
  • experience
  • expert witness
  • exploits
  • facebook
  • FERPA
  • file integrity monitoring
  • firewalls
  • forensics
  • full disk encryption
  • global warming
  • goal setting
  • good blogs
  • government intrusion
  • government regulations
  • great quotes
  • hacking
  • hardware
  • hipaa
  • hitech
  • hitech act
  • home security
  • humor
  • identity access management
  • identity theft
  • IIS
  • incident response
  • information classification
  • information security quotes
  • intel
  • intellectual property
  • internal threat
  • java
  • Kevin's books
  • Kevin's interviews
  • Kevin's keynotes
  • kevin's panels
  • kevin's quotes
  • Kevin's security content
  • Kevin's seminars
  • Kevin's videos
  • laptop encryption
  • laptop security
  • legal
  • Linux
  • locking screens
  • low-hanging fruit
  • malware
  • marketing hype
  • message from Kevin
  • messaging security
  • metasploit
  • metrics
  • mobile apps
  • mobile security
  • motivation
  • multi-factor authentication
  • network analysis
  • network complexities
  • network protocols
  • network security
  • networking essentials
  • Novell
  • office
  • online backup
  • online safety
  • open source security
  • owasp
  • p2p
  • passwords
  • patch management
  • patching
  • pci 6.6
  • pci dss
  • PCNAA
  • penetration testing
  • people problems
  • personal responsibility
  • phishing
  • physical security
  • pii
  • podcasts
  • policy enforcement
  • politics
  • presentations
  • privacy
  • quality assurance
  • recommended books
  • recommended magazines
  • recycling
  • remote access security
  • ridiculous password requirements
  • risk analysis
  • risk management
  • rogue insiders
  • ROI
  • RSA 2012
  • running a business
  • saas
  • salary
  • scary stuff
  • sccm
  • sdlc
  • security assessments
  • security audits
  • security awareness
  • security committees
  • security leadership
  • security management
  • security operations
  • security policies
  • security policy
  • security scans
  • security standards
  • security statistics
  • security technologies
  • security testing tools
  • security tools
  • selling security
  • sharepoint
  • small business
  • smartphone security
  • SMBs
  • social media
  • software development
  • source code
  • source code analysis
  • special offer
  • SQL injection
  • sql server
  • ssl
  • storage security
  • student information systems
  • stupid security
  • success
  • telecommuting
  • testimonials
  • thinking long term
  • third-party applications
  • threat modeling
  • time management
  • training
  • twitter
  • uncool products
  • unstructured information
  • unstructured infromation
  • user awareness
  • vendors
  • virtual machine security
  • visibility
  • voip
  • vulnerability assessments
  • web 2.0
  • web application security
  • web browser security
  • web server security
  • webcasts
  • WebInspect
  • whitelisting
  • whitepapers
  • Windows
  • Windows 7
  • windows 8
  • windows 8.1
  • Windows Mobile
  • windows security
  • Windows Vista
  • wireless
  • wireless security
  • zero tolerance

Blog Archive

  • ►  2013 (35)
    • ►  November (3)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  July (3)
    • ►  June (1)
    • ►  May (4)
    • ►  April (4)
    • ►  March (4)
    • ►  February (5)
    • ►  January (5)
  • ▼  2012 (77)
    • ▼  December (2)
      • IT security careers, committees, and corruption
      • What do credibility, BYOD, & mobile security have ...
    • ►  November (2)
      • Fix for painful authenticated web vulnerability sc...
      • Are you doing enough to protect your secrets? It's...
    • ►  October (4)
      • Arguing for infosec's limitations
      • Calling all executives and managers...
      • Windows server and workstation security essentials
      • One-sided information risk management doesn't work
    • ►  September (3)
      • Be it in healthcare or infosec, the short term is ...
      • Perhaps the biggest & most widespread security gaf...
      • GoDaddy: 'Malfunction' as the new scapegoat?
    • ►  August (3)
      • You can't buy security for $1, but some people wil...
      • Aiming for the CISSP? Check out this book.
      • Pressure washer v. university data center...guess ...
    • ►  July (4)
      • This week's webcast on common sense security
      • Interesting quote on human psyche that relates to ...
      • With all the recent hype and hoopla over Windows 8...
      • What NTOSpider offers the appsec world
    • ►  June (5)
      • Want to know the traits of top infosec leaders?
      • The security conversation is not a one-time deal
      • Focus on yourself and reap the rewards in IT & inf...
      • The weakness of vulnerability scans that people (s...
      • Great quote that applies to information security
    • ►  May (9)
      • Thank a veteran
      • Real-life example of people not seeing the big pic...
      • New video: My take on #BYOD - It's something you c...
      • IT's malignant narcissism and what you can do to r...
      • Web application security assessment war stories
      • New video: The things my most secure clients have ...
      • Quote on reasoning with the unreasonable and why c...
      • Video: The (partial) solution to information secur...
      • The funny thing about iPhones & airplane toilets
    • ►  April (5)
      • My webcast on software source code analysis
      • How are you spending your time?
      • Basic features of WebInspect - the kind of stuff g...
      • Video: Here's the one thing you can do to improve ...
      • Disk encryption for HIPAA + HITECH & why BitLocker...
    • ►  March (10)
      • Video: Don't worry about your title, focus on this...
      • This is your crazy JetBlue captain speaking
      • Don't underestimate the value of firewall rulebase...
      • An interesting Microsoft tool to help with data cl...
      • Neat tools to seek out sensitive files on laptops ...
      • Flaws, compliance and the Cybersecurity Act of 2012
      • My upcoming webcast with Checkmarx: How to Use Sou...
      • My Atlanta CDW/TechTarget seminar
      • My upcoming webcast on firewall management
      • My final takeaway from #RSAC
    • ►  February (14)
      • Video: #RSAC 2012 is off and running
      • Live from #RSAC: Cloud computing's got some kinks ...
      • Video: Seeing the big picture in information security
      • CDW-TechTarget seminars are back this year - join ...
      • Got compliance on your mind?
      • Is it really possible to get users on board with s...
      • SQL injection cheatsheet & tips for getting manage...
      • Video: The one infosec skill you need to be workin...
      • Video: My new whitepaper on advanced malware and h...
      • Video: My new whitepaper on SQL Server security th...
      • What's it going to take for police departments to ...
      • Introducing my information security YouTube channe...
      • If we can't even get beyond our own unhealthy life...
      • My new material on Web application & website security
    • ►  January (16)
      • Where's your information security focus?
      • You cannot multiple security by dividing it - Info...
      • Evanta CISO event and why St. Jude's has it right
      • Complacency, meet APT – How basic oversights lead ...
      • Are your high-tech devices enslaving you?
      • My articles & webcasts on hacking, incident respon...
      • Executives could learn a lot from Supernanny
      • The role of IT in fighting today’s malware
      • My interview in Hackin9 magazine
      • Quoted in today's SC Magazine feature story on Sym...
      • Great year for my book Hacking For Dummies, 3rd ed...
  • ►  2011 (163)
    • ►  December (15)
    • ►  November (11)
    • ►  October (9)
    • ►  September (16)
    • ►  August (13)
    • ►  July (8)
    • ►  June (13)
    • ►  May (18)
    • ►  April (16)
    • ►  March (13)
    • ►  February (13)
    • ►  January (18)
  • ►  2010 (170)
    • ►  December (10)
    • ►  November (14)
    • ►  October (7)
    • ►  September (27)
    • ►  August (20)
    • ►  July (8)
    • ►  June (15)
    • ►  May (4)
    • ►  April (23)
    • ►  March (21)
    • ►  February (11)
    • ►  January (10)
  • ►  2009 (55)
    • ►  December (5)
    • ►  November (10)
    • ►  October (21)
    • ►  September (19)
Powered by Blogger.

About Me

Unknown
View my complete profile