November 30, 2011

The Privacy and Security Implications of Misusing Technology

If you haven’t already heard of Carrier IQ, you need to do some serious web searching, as they are swiftly becoming the new name in technology misuse […]
October 29, 2011

My Workplace Technology Wish List

It is not every day that one gets an opportunity to put together a wish list of technology solutions that could be used to drive a […]
October 15, 2011

Guess What? Technology is not easy

It might seem that way because of how ubiquitous it is, but technology is not really easy.  Lots of time has been spent trying to hide […]
August 21, 2011

Managing a Garden

Since May of this year, we have started a little “Green Grocer” project (as my neighbor likes to call it).  It started out from four (4) seedling […]
July 13, 2011

Where Netflix Went Wrong: Corporate Communications

The good folks at Netflix recently announced a huge price hike for their customers, as they separate their DVD and streaming businesses into distinct product offerings.  If […]
June 29, 2011

Effectively Managing Risk

Despite the significant uptick in information security events on display thus far in 2011, and despite the diversity and caliber of organizations that are being breached, […]
June 9, 2011

To Disclose or not to Disclose

…that is the question. Every time a software vendor experiences a vulnerability or releases patches for a serious security issue, the debate about Full Disclosure or […]
May 31, 2011

Just ask Sony…

Why should you take your organization’s information security posture seriously? Just ask Sony.  It has been estimated that Sony will spend more than $170 million dollars due to […]
May 3, 2011

Managing Technology-based Risks

Risks exist. You would think that this is so obvious as to not need saying, but too many people appear to operate as though downplaying or […]
April 29, 2011

Reactive Security: Feel the pain in 2011+

We are only one third of the way into 2011, but we have had some of the largest information security breaches of the decade – and […]
March 31, 2011

Maintaining Good Security Practices

Security is not just a state of being. We are often called to provide an assessment about our present security posture, and usually, the person asking […]
February 15, 2011

Why Your New Technology Purchase Might Disappoint – Part 2

Last time, I mentioned that inadequate planning is one of the key reasons why your new technology purchase might prove to be disappointing.  This is true […]
December 12, 2006

SANS sees upsurge in zero-day Web-based attacks

It’s pretty much official now (in case you didn’t believe it before):  We have exited the Worm era, and jumped head first into the era of specialized […]
April 13, 2010

Expanding Your Reach with Good Technology Partners

I recently read an opinion piece on ComputerWorld about the post-Cloud IT landscape, and it I had a couple thoughts: The author makes a good point that little mention […]
May 10, 2010

It’s Time to Re-evaluate Host-based Security

I’ve said it for a few years now, but host-based antivirus is really not working out anymore.  Not with its reliance on signatures to detect malware. […]
July 30, 2010

The State of Data Breaches in 2010

I had a chance to review the 2010 Verizon Data Breach Reporttoday, which I was alerted to by ISC.SANS.ORG.  They’ve put together data from 2004 through 2009, and […]
March 31, 2011

Maintaining Good Security Practices

Security is not just a state of being. We are often called to provide an assessment about our present security posture, and usually, the person asking […]
April 29, 2011

Reactive Security: Feel the pain in 2011+

We are only one third of the way into 2011, but we have had some of the largest information security breaches of the decade – and […]
May 31, 2011

Just ask Sony…

Why should you take your organization’s information security posture seriously? Just ask Sony.  It has been estimated that Sony will spend more than $170 million dollars due to […]
June 29, 2011

Effectively Managing Risk

Despite the significant uptick in information security events on display thus far in 2011, and despite the diversity and caliber of organizations that are being breached, […]
March 31, 2012

Managing Your Personal Security

In the past few days, we learned that Global Payments Inc, a middle-man credit checking company, suffered a breach of its systems starting in January of this […]
November 30, 2012

Job Hunting: It’s All About Relationships

Earlier this week, I read an article about unemployment and the struggles of those coming out of college and graduate school who are seeking jobs. A […]
January 18, 2013

Reading Between the Lines of Breach Notifications

Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance […]
January 21, 2013

The Futility of Blaming IT

In recent years, it has become popular sport to blame information technology (IT) departments and IT leaders for failures – real or imagined – which adversely […]