Tech Support For Dummies
Friday, 30 October 2009
You'd think Twitter would have the means to fix this
Posted on 02:51
by Unknown
Seems like I get it more often than not these days...Ahh, the growing pains of an Internet startup.
Email This
BlogThis!
Share to X
Share to Facebook
Share to Pinterest
Posted in
business continuity
,
twitter
|
No comments
Newer Post
Older Post
Home
0 comments:
Post a Comment
Subscribe to:
Post Comments (Atom)
Popular Posts
Reactive security, eh? How’s that workin' for ya?
Every time I browse the Chronology of Data Breaches and read the headlines coming out from Dark Reading, threatpost, and the like, I can...
The compliance crutch mentality rides on
I believe it was my colleague Kevin Bocek who once said: "Security done right will yield compliance for free. Compliance for complianc...
Reaver Pro: a simple tool for cracking WPA on a LOT of wireless networks
If wireless security testing is on your radar, you need to get Reaver Pro . As I outlined in this Hacking For Dummies, 4th edition chapter ,...
Join me live online today with TechTarget & ISACA
Today is our live virtual seminar Making the Case for the Cloud: The Next Steps . Join me, Urs Fischer, Dave Shackleford, Andrew Baer and Di...
My new material on Web application & website security
Here are several new pieces I've written on Web site/application security. Lots of angles and considerations: There’s more to web securi...
Wooo...HIPAA audits are coming & the irony of KPMG's involvement
I've always believed that compliance is a threat to business [hence why I help businesses take the pain out of compliance by addressing ...
It's hard being human
Cavett Robert once said something about character that resonates within information security - especially regarding ongoing management and l...
"Top Blogs" list & some home security considerations
I think I may have found the first sign that my blog is growing and gaining some traction. I've made it to the Top 20 Home Security Blog...
Talk is cheap: Time to rethink your data retention strategy (or lack thereof)?
Here's a fascinating story about a court case involving data retention you need to read. And pass it along to your management as well. ...
Common sense counts the most
A great quote I heard over the weekend has a direct tie-in to what we focus (or don't focus) our efforts on in information security. NAS...
Categories
active directory
application firewalls
APTs
aslr
atm security
audio programs
audit logging
automated scanner oversights
back to basics
backups
big brother
bitlocker
budget
business case for security
business continuity
BYOD
car hacking
careers
certifications
change management
checklist audits
cissp
clear wireless
cloud computing
communication
compliance
computer glitch
conferences
consulting
content filtering
cool products
cool sites
cross-site request forgery
cross-site scripting
csrf
customer no service
cybersecurity bill
data at rest
data breach laws
data breaches
data centers
data destruction
data leakage
data protection
data retention
database security
degrees
desktop management
disaster recovery
disk imaging
disposal
dns
document security
domino
DoS attacks
drive encryption
e-discovery
ediscovery
employee monitoring
encrypting data in transit
encryption
end point security
ethical hacking
exchange
experience
expert witness
exploits
facebook
FERPA
file integrity monitoring
firewalls
forensics
full disk encryption
global warming
goal setting
good blogs
government intrusion
government regulations
great quotes
hacking
hardware
hipaa
hitech
hitech act
home security
humor
identity access management
identity theft
IIS
incident response
information classification
information security quotes
intel
intellectual property
internal threat
java
Kevin's books
Kevin's interviews
Kevin's keynotes
kevin's panels
kevin's quotes
Kevin's security content
Kevin's seminars
Kevin's videos
laptop encryption
laptop security
legal
Linux
locking screens
low-hanging fruit
malware
marketing hype
message from Kevin
messaging security
metasploit
metrics
mobile apps
mobile security
motivation
multi-factor authentication
network analysis
network complexities
network protocols
network security
networking essentials
Novell
office
online backup
online safety
open source security
owasp
p2p
passwords
patch management
patching
pci 6.6
pci dss
PCNAA
penetration testing
people problems
personal responsibility
phishing
physical security
pii
podcasts
policy enforcement
politics
presentations
privacy
quality assurance
recommended books
recommended magazines
recycling
remote access security
ridiculous password requirements
risk analysis
risk management
rogue insiders
ROI
RSA 2012
running a business
saas
salary
scary stuff
sccm
sdlc
security assessments
security audits
security awareness
security committees
security leadership
security management
security operations
security policies
security policy
security scans
security standards
security statistics
security technologies
security testing tools
security tools
selling security
sharepoint
small business
smartphone security
SMBs
social media
software development
source code
source code analysis
special offer
SQL injection
sql server
ssl
storage security
student information systems
stupid security
success
telecommuting
testimonials
thinking long term
third-party applications
threat modeling
time management
training
twitter
uncool products
unstructured information
unstructured infromation
user awareness
vendors
virtual machine security
visibility
voip
vulnerability assessments
web 2.0
web application security
web browser security
web server security
webcasts
WebInspect
whitelisting
whitepapers
Windows
Windows 7
windows 8
windows 8.1
Windows Mobile
windows security
Windows Vista
wireless
wireless security
zero tolerance
Blog Archive
►
2013
(35)
►
November
(3)
►
October
(3)
►
September
(1)
►
August
(2)
►
July
(3)
►
June
(1)
►
May
(4)
►
April
(4)
►
March
(4)
►
February
(5)
►
January
(5)
►
2012
(77)
►
December
(2)
►
November
(2)
►
October
(4)
►
September
(3)
►
August
(3)
►
July
(4)
►
June
(5)
►
May
(9)
►
April
(5)
►
March
(10)
►
February
(14)
►
January
(16)
►
2011
(163)
►
December
(15)
►
November
(11)
►
October
(9)
►
September
(16)
►
August
(13)
►
July
(8)
►
June
(13)
►
May
(18)
►
April
(16)
►
March
(13)
►
February
(13)
►
January
(18)
►
2010
(170)
►
December
(10)
►
November
(14)
►
October
(7)
►
September
(27)
►
August
(20)
►
July
(8)
►
June
(15)
►
May
(4)
►
April
(23)
►
March
(21)
►
February
(11)
►
January
(10)
▼
2009
(55)
►
December
(5)
►
November
(10)
▼
October
(21)
1 day left for 50% discount on current audio programs
You'd think Twitter would have the means to fix this
Disaster recovery is dead?? Not hardly!
Metasploit as we knew it going bye bye?
Email business continuity - this is funny...and ir...
The fastest vendor acquisition I've seen
Cloud computing & customer no-service - match made...
In case you're trying to email me...
Latest version of LANguard worth considering
Proper password length
Cool tool for cracking/resetting SQL Server passwords
My latest security content
Asking the right questions
Don't give up
Good info on hardening Windows XP
10 Ways to Become Indispensable at Work
National Archives does it again!
My latest security content
This is really cool and really scary
The deal with my Security On Wheels audio programs
Great quote to help motivate you
►
September
(19)
Powered by
Blogger
.
About Me
Unknown
View my complete profile
0 comments:
Post a Comment