April 30, 2013

Dueling Business Mindsets

If there is one lesson that technologists need to understand in order to be successful, it’s that business is ultimately more about people than about processor technology.  At the end […]
April 5, 2013

Enhancing My WLAN with a Meraki MR12

I finally got a chance to deploy a Meraki MR12 wireless access point. These are some sweet devices.  I wasn’t that happy with the PoE brick that […]
February 28, 2013

Wise Security Investment Approaches

A holistic approach to information security needs to address a corporate strategy for buying or building solutions. Such a strategy will have an impact on how […]
January 21, 2013

The Futility of Blaming IT

In recent years, it has become popular sport to blame information technology (IT) departments and IT leaders for failures – real or imagined – which adversely […]
January 18, 2013

Reading Between the Lines of Breach Notifications

Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance […]
December 31, 2012

Get Real with Information Security

In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased […]
November 30, 2012

Job Hunting: It’s All About Relationships

Earlier this week, I read an article about unemployment and the struggles of those coming out of college and graduate school who are seeking jobs. A […]
September 21, 2012

Why We Have No Online Privacy

Earlier today, as I read a very self-serving article lamenting how online growth will be killed due to impending “Do Not Track” legislation, it became very clear to me […]
August 14, 2012

Securing Your Storage – Part 1

If you’re going to make use of cloud-based storage, it is a good idea to ensure that you keep it secure.  Unless you are absolutely, positively […]
July 13, 2012

Dear Recruiter: Help Me Help You

As we head into the second half of 2012, I average about 3 to 4 calls/emails from recruiters per week.  In contrast to the overall job […]
June 20, 2012

I’m Tired of Registration Walls

Note to the heads of sales, marketing, and web site development: I’m tired of your registration walls (regwalls), and will no longer be supporting them. I […]
June 14, 2012

So, You Want To Be a Technology Consultant?

Doesn’t everyone want to be a consultant? Probably not…  There are some clear advantages to working for yourself, and there are some clear disadvantages. Likewise, there […]
July 13, 2012

Dear Recruiter: Help Me Help You

As we head into the second half of 2012, I average about 3 to 4 calls/emails from recruiters per week.  In contrast to the overall job […]
August 14, 2012

Securing Your Storage – Part 1

If you’re going to make use of cloud-based storage, it is a good idea to ensure that you keep it secure.  Unless you are absolutely, positively […]
December 31, 2012

Get Real with Information Security

In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased […]
January 18, 2013

Reading Between the Lines of Breach Notifications

Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance […]
January 21, 2013

The Futility of Blaming IT

In recent years, it has become popular sport to blame information technology (IT) departments and IT leaders for failures – real or imagined – which adversely […]
February 28, 2013

Wise Security Investment Approaches

A holistic approach to information security needs to address a corporate strategy for buying or building solutions. Such a strategy will have an impact on how […]
May 8, 2013

A look at Microsoft’s SIR v14

So…. I finally had a chance to finish reading the latest full edition of Microsoft’s latest Security Intelligence Report. There’s a lot of really good info in […]
September 25, 2017

Whose data is it, anyway?

It’s not just that we are experiencing big firms getting breached due to sheer negligence, but that no one is going to do anything about it […]
October 17, 2017

Not the best week for security protocols and technologies

The past few days have not been particularly good ones for the technology community.  First, we learned that the increasingly fragile WPA2 protocol has some glaring […]
March 4, 2018

Virtual Credit Card Numbers

If your bank supports it, you would do well to consider Virtual Credit Card numbers for online purchases. I was looking around for some good articles […]