February 28, 2013

Wise Security Investment Approaches

A holistic approach to information security needs to address a corporate strategy for buying or building solutions. Such a strategy will have an impact on how […]
January 21, 2013

The Futility of Blaming IT

In recent years, it has become popular sport to blame information technology (IT) departments and IT leaders for failures – real or imagined – which adversely […]
January 18, 2013

Reading Between the Lines of Breach Notifications

Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance […]
December 31, 2012

Get Real with Information Security

In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased […]
November 30, 2012

Job Hunting: It’s All About Relationships

Earlier this week, I read an article about unemployment and the struggles of those coming out of college and graduate school who are seeking jobs. A […]
September 21, 2012

Why We Have No Online Privacy

Earlier today, as I read a very self-serving article lamenting how online growth will be killed due to impending “Do Not Track” legislation, it became very clear to me […]
August 14, 2012

Securing Your Storage – Part 1

If you’re going to make use of cloud-based storage, it is a good idea to ensure that you keep it secure.  Unless you are absolutely, positively […]
July 13, 2012

Dear Recruiter: Help Me Help You

As we head into the second half of 2012, I average about 3 to 4 calls/emails from recruiters per week.  In contrast to the overall job […]
June 20, 2012

I’m Tired of Registration Walls

Note to the heads of sales, marketing, and web site development: I’m tired of your registration walls (regwalls), and will no longer be supporting them. I […]
June 14, 2012

So, You Want To Be a Technology Consultant?

Doesn’t everyone want to be a consultant? Probably not…  There are some clear advantages to working for yourself, and there are some clear disadvantages. Likewise, there […]
May 22, 2012

Making the Most of Social and Professional Networking

As social/professional networking continues to proliferate, users and organizations alike, seek to find the ways to make the most of the growing trend.  A recent infographic shows […]
March 31, 2012

Managing Your Personal Security

In the past few days, we learned that Global Payments Inc, a middle-man credit checking company, suffered a breach of its systems starting in January of this […]
October 19, 2006

The Fearful State of Malware Today

Simply stated, it’s really getting out of hand. A number of recent articles in the technology press make it increasing clear that the following themes are […]
October 23, 2006

Growing Malware Sophistication

The level of sophistication of the malware threats we face is continuing to grow at a much faster rate that the methods that most organizations are […]
October 30, 2006

Who is Clueless about Technology?

An article I read on ZDNet this week laments that fact that politicians as a group are woefully clueless about technology issues, yet keep pressing ahead with projects […]
November 2, 2006

Microsoft and Novell: The Odd Couple

The tech news is all abuzz about the announcement that Microsoft and Novell are working together on product integration, including integration between Windows and Linux technologies. Several people […]
November 2, 2006

Microsoft Updates Vista Licensing — Again

As expected, Microsoft has softened a key element of Vista licensing, enabling (more like re-enabling, if you think about it) users to transfer their retail license from one system […]
November 3, 2006

Get Your Recent Microsoft Releases

Yeah, we’re still waiting on Vista and Longhorn, but Microsoft has already starting releasing some other applications since October. Step right up and get your dose of new products: […]
November 8, 2006

Vista: Here it comes…

Or rather, there it goes — off to manufacturing. It will be very interesting to see how stable Windows Vista is in real-world deployments, but it is certainly is […]
November 19, 2006

Pando Released…

Pando v1.0 has finally been released, after spending some good time in the beta testing cycle.  If you haven’t seen or used it as yet, you’re […]
November 21, 2006

Virtual Machine Detection in Malware via Commercial Tools

More About Sophisticated Malware http://isc.sans.org/diary.php?storyid=1871 Virtual machine detection is a self-defensive property of many malware specimens. It is aimed at making it harder to examine the […]
November 27, 2006

Backdoor Trojans, Rootkits and SPAM: Notes from the Microsoft Antimalware Team

The Microsoft AntiMalware team has recently published a paper discussing some of the data collected by their monthly AntiMalware tool. A summary of the article is […]
November 28, 2006

More Malware, More SPAM

According to some reports, spyware is getting harder and harder to control.  The sophistication of the malware makers is growing at a much faster pace than […]
December 5, 2006

Zero-Day Tracker from eEye Digital Security

The folks at eEye Digital Security have put together a website that tracks various zero-day vulnerabilities, and offers analysis and remediation recommendations.  The site is called Zero-Day Tracker, and […]