April 30, 2013

Dueling Business Mindsets

If there is one lesson that technologists need to understand in order to be successful, it’s that business is ultimately more about people than about processor technology.  At the end […]
April 5, 2013

Enhancing My WLAN with a Meraki MR12

I finally got a chance to deploy a Meraki MR12 wireless access point. These are some sweet devices.  I wasn’t that happy with the PoE brick that […]
February 28, 2013

Wise Security Investment Approaches

A holistic approach to information security needs to address a corporate strategy for buying or building solutions. Such a strategy will have an impact on how […]
January 21, 2013

The Futility of Blaming IT

In recent years, it has become popular sport to blame information technology (IT) departments and IT leaders for failures – real or imagined – which adversely […]
January 18, 2013

Reading Between the Lines of Breach Notifications

Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance […]
December 31, 2012

Get Real with Information Security

In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased […]
November 30, 2012

Job Hunting: It’s All About Relationships

Earlier this week, I read an article about unemployment and the struggles of those coming out of college and graduate school who are seeking jobs. A […]
September 21, 2012

Why We Have No Online Privacy

Earlier today, as I read a very self-serving article lamenting how online growth will be killed due to impending “Do Not Track” legislation, it became very clear to me […]
August 14, 2012

Securing Your Storage – Part 1

If you’re going to make use of cloud-based storage, it is a good idea to ensure that you keep it secure.  Unless you are absolutely, positively […]
July 13, 2012

Dear Recruiter: Help Me Help You

As we head into the second half of 2012, I average about 3 to 4 calls/emails from recruiters per week.  In contrast to the overall job […]
June 20, 2012

I’m Tired of Registration Walls

Note to the heads of sales, marketing, and web site development: I’m tired of your registration walls (regwalls), and will no longer be supporting them. I […]
June 14, 2012

So, You Want To Be a Technology Consultant?

Doesn’t everyone want to be a consultant? Probably not…  There are some clear advantages to working for yourself, and there are some clear disadvantages. Likewise, there […]
August 15, 2006

My first blogging attempt with Windows Live Writer

Okay, so after reading about 5 different reviews on the joy and wonder of Windows Live Writer, I just had to go out and try it myself.   […]
August 25, 2006

Internet Explorer Patch Re-Released

Yesterday, Microsoft re-released security bulletin MS06-042 because the original release introduced a buffer overflow condition for some customers. Everyone is advised to get the new update, because the buffer overflow is […]
August 28, 2006

Vista is getting closer

According to some reports, the latest build of Vista released to testers displayed improved stability and performance, and looking like it will make the holiday season without issue.  A […]
September 6, 2006

Windows Live Writer Plug-ins

Windows Live Writer is turning out to be one of those tools that I can’t live without, much as I originally suspected. And it has been made even […]
September 27, 2006

Windows Live Writer Update

Microsoft just released an update to Windows Live Writer.  There are some great changes, including better support for tags, faster loading times, and some new plug-ins.  I’m […]
September 27, 2006

PowerShell RC2 is available…

Sort of. Perhaps, within a couple of hours it will really be available, but right now, all I can point you to is a link from Microsoft that […]
October 3, 2006

Vista vs the World

Or, perhaps I should say Microsoft vs Security providers in the Windows space? What I’m talking about eWeek’s report that discloses McAfee’s complaint that Microsoft has made it […]
October 3, 2006

Security: Product vs People and Process

One of the hardest concepts to emphasize concerning Information Security is that people and processes are more critical to your overall security posture than products are.   […]
October 4, 2006

Really, How Hard Can Email Sorting Be?

I’ve been using Microsoft Outlook for a long time — since the OL97 days, in fact — and I’ve gone through all the different incarnations of the nefarious […]
October 5, 2006

Minor System Upgrade

I was forced to upgrade one of my systems this week because the motherboard (or CPU) died.  Rather than mess around trying to figure out which specific component […]
October 6, 2006

Vista vs the Security Vendors

Otherwise known as Vista vs the Selfish Security Vendors: Part Two… Here’s a follow-up to my earlier Vista vs the World post, where I noted I greatly preferred a […]
October 18, 2006

Oracle’s Patch Updates

October 2006 is going to be a major month for Oracle.  First, the database and middleware powerhouse has made some significant changes to its patch management process. Secondly, […]