March 31, 2011

Maintaining Good Security Practices

Security is not just a state of being. We are often called to provide an assessment about our present security posture, and usually, the person asking […]
February 15, 2011

Why Your New Technology Purchase Might Disappoint – Part 2

Last time, I mentioned that inadequate planning is one of the key reasons why your new technology purchase might prove to be disappointing.  This is true […]
January 31, 2011

Why Your New Technology Purchase Might Disappoint

Technology continues to provide many benefits for individuals and businesses, and our increasing dependence upon it is a testament to its overall usefulness.  Each day, many, […]
January 27, 2011

UltraTech Knowledgebase Table of Contents

UltraTech Knowledgebase Table of Contents Last Updated: 27 Jan 2011 (Prior Update: 16 Sep 2007) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ *** PLEASE NOTE: Link(s), If Provided, May Be Wrapped *** […]
December 8, 2010

The Dangers of Consolidation

It has been said that technology in general, and automation in particular, simply make it easier for humans to propagate errors much faster than they could […]
November 9, 2010

Fun with Verizon Customer Service

Or, Getting Rid of FiOS TV, Part 1. Today, we officially began our project to lower needless expenses, of which the TV subscription service is one […]
October 31, 2010

Passing the Firewall Torch

p Policy, but that’s a tale for another time…) The second problem was a little trickier, however.  The WAN port on my NS-5XT was only 10Mbit/s.   […]
September 26, 2010

It’s The Little Things That Get You Every Time…

Even on the smallest of networks, the failure to pay attention to every detail can make a routine upgrade or migration far more complicated than it […]
August 31, 2010

The Fun Summer of 2010 – Overview

Things have been good and busy this year for me.  Overall, I can’t complain.  🙂 Since June, I’ve been busy with a new corporate challenge, and […]
July 30, 2010

The State of Data Breaches in 2010

I had a chance to review the 2010 Verizon Data Breach Reporttoday, which I was alerted to by ISC.SANS.ORG.  They’ve put together data from 2004 through 2009, and […]
June 30, 2010

Understanding What Your Children Really Mean

Ever wanted to know what your children really mean when they answer your questions? Use this handy translation guide to better understand what your children are […]
May 10, 2010

It’s Time to Re-evaluate Host-based Security

I’ve said it for a few years now, but host-based antivirus is really not working out anymore.  Not with its reliance on signatures to detect malware. […]
June 29, 2011

Effectively Managing Risk

Despite the significant uptick in information security events on display thus far in 2011, and despite the diversity and caliber of organizations that are being breached, […]
March 31, 2012

Managing Your Personal Security

In the past few days, we learned that Global Payments Inc, a middle-man credit checking company, suffered a breach of its systems starting in January of this […]
August 14, 2012

Securing Your Storage – Part 1

If you’re going to make use of cloud-based storage, it is a good idea to ensure that you keep it secure.  Unless you are absolutely, positively […]
September 21, 2012

Why We Have No Online Privacy

Earlier today, as I read a very self-serving article lamenting how online growth will be killed due to impending “Do Not Track” legislation, it became very clear to me […]
December 31, 2012

Get Real with Information Security

In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased […]
January 18, 2013

Reading Between the Lines of Breach Notifications

Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance […]
April 5, 2013

Enhancing My WLAN with a Meraki MR12

I finally got a chance to deploy a Meraki MR12 wireless access point. These are some sweet devices.  I wasn’t that happy with the PoE brick that […]
September 25, 2017

Whose data is it, anyway?

It’s not just that we are experiencing big firms getting breached due to sheer negligence, but that no one is going to do anything about it […]