April 30, 2013

Dueling Business Mindsets

If there is one lesson that technologists need to understand in order to be successful, it’s that business is ultimately more about people than about processor technology.  At the end […]
April 5, 2013

Enhancing My WLAN with a Meraki MR12

I finally got a chance to deploy a Meraki MR12 wireless access point. These are some sweet devices.  I wasn’t that happy with the PoE brick that […]
February 28, 2013

Wise Security Investment Approaches

A holistic approach to information security needs to address a corporate strategy for buying or building solutions. Such a strategy will have an impact on how […]
January 21, 2013

The Futility of Blaming IT

In recent years, it has become popular sport to blame information technology (IT) departments and IT leaders for failures – real or imagined – which adversely […]
January 18, 2013

Reading Between the Lines of Breach Notifications

Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance […]
December 31, 2012

Get Real with Information Security

In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased […]
November 30, 2012

Job Hunting: It’s All About Relationships

Earlier this week, I read an article about unemployment and the struggles of those coming out of college and graduate school who are seeking jobs. A […]
September 21, 2012

Why We Have No Online Privacy

Earlier today, as I read a very self-serving article lamenting how online growth will be killed due to impending “Do Not Track” legislation, it became very clear to me […]
August 14, 2012

Securing Your Storage – Part 1

If you’re going to make use of cloud-based storage, it is a good idea to ensure that you keep it secure.  Unless you are absolutely, positively […]
July 13, 2012

Dear Recruiter: Help Me Help You

As we head into the second half of 2012, I average about 3 to 4 calls/emails from recruiters per week.  In contrast to the overall job […]
June 20, 2012

I’m Tired of Registration Walls

Note to the heads of sales, marketing, and web site development: I’m tired of your registration walls (regwalls), and will no longer be supporting them. I […]
June 14, 2012

So, You Want To Be a Technology Consultant?

Doesn’t everyone want to be a consultant? Probably not…  There are some clear advantages to working for yourself, and there are some clear disadvantages. Likewise, there […]
April 30, 2013

Dueling Business Mindsets

If there is one lesson that technologists need to understand in order to be successful, it’s that business is ultimately more about people than about processor technology.  At the end […]
April 5, 2013

Enhancing My WLAN with a Meraki MR12

I finally got a chance to deploy a Meraki MR12 wireless access point. These are some sweet devices.  I wasn’t that happy with the PoE brick that […]
February 28, 2013

Wise Security Investment Approaches

A holistic approach to information security needs to address a corporate strategy for buying or building solutions. Such a strategy will have an impact on how […]
January 21, 2013

The Futility of Blaming IT

In recent years, it has become popular sport to blame information technology (IT) departments and IT leaders for failures – real or imagined – which adversely […]
January 18, 2013

Reading Between the Lines of Breach Notifications

Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance […]
December 31, 2012

Get Real with Information Security

In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased […]
November 30, 2012

Job Hunting: It’s All About Relationships

Earlier this week, I read an article about unemployment and the struggles of those coming out of college and graduate school who are seeking jobs. A […]
September 21, 2012

Why We Have No Online Privacy

Earlier today, as I read a very self-serving article lamenting how online growth will be killed due to impending “Do Not Track” legislation, it became very clear to me […]
August 14, 2012

Securing Your Storage – Part 1

If you’re going to make use of cloud-based storage, it is a good idea to ensure that you keep it secure.  Unless you are absolutely, positively […]
July 13, 2012

Dear Recruiter: Help Me Help You

As we head into the second half of 2012, I average about 3 to 4 calls/emails from recruiters per week.  In contrast to the overall job […]
June 20, 2012

I’m Tired of Registration Walls

Note to the heads of sales, marketing, and web site development: I’m tired of your registration walls (regwalls), and will no longer be supporting them. I […]
June 14, 2012

So, You Want To Be a Technology Consultant?

Doesn’t everyone want to be a consultant? Probably not…  There are some clear advantages to working for yourself, and there are some clear disadvantages. Likewise, there […]