December 31, 2006

Happy New Year

I must say that 2006 has been a very intriguing year, both personally and professionally.  Many things were accomplished, but many things are yet to be […]
December 26, 2006

Major Holiday Upgrades

First of all, I hope that everyone has had a very enjoyable Christmas with friends and family.  I know that the holidays aren’t always pleasant for […]
December 12, 2006

Reports Indicate Healthy 2007 for Information Technology

Some good news to start out 2007: Signs are pointing to a healthy new year for information technology. The job market for I.T. workers is expanding, […]
December 12, 2006

SANS sees upsurge in zero-day Web-based attacks

It’s pretty much official now (in case you didn’t believe it before):  We have exited the Worm era, and jumped head first into the era of specialized […]
December 9, 2006

Looking for the next CPU breakthrough…

The folks at MIT have made some serious progress in the search for the replacement material for silicon in transistors. One of the materials being discussed, according […]
December 5, 2006

Zero-Day Tracker from eEye Digital Security

The folks at eEye Digital Security have put together a website that tracks various zero-day vulnerabilities, and offers analysis and remediation recommendations.  The site is called Zero-Day Tracker, and […]
December 5, 2006

Another Community Server Update

Looks like Telligent caught me off-guard with an update to Community Server. Service Pack 2 for Community Server v2.1 was released today.  I didn’t even have a hint that they were […]
December 4, 2006

News Analysis: Amid hints Bush will change policy, clues that he won’t

Here’s an interesting piece from the New York Times about the US strategy in Iraq.  My particular interest is with the following excerpt: WASHINGTON: The debate that […]
November 28, 2006

More Malware, More SPAM

According to some reports, spyware is getting harder and harder to control.  The sophistication of the malware makers is growing at a much faster pace than […]
November 28, 2006

What if Microsoft Made the iPod?

This is an immensely hilarious parody of what would happen if Microsoft had produced the iPod. http://video.google.com/videoplay?docid=36099539665548298 Perhaps we should look at a Zune box to verify? 
November 27, 2006

Backdoor Trojans, Rootkits and SPAM: Notes from the Microsoft Antimalware Team

The Microsoft AntiMalware team has recently published a paper discussing some of the data collected by their monthly AntiMalware tool. A summary of the article is […]
November 23, 2006

The Daily News FAQ from Community Server

The world of Telligent and Community Server is ever-changing.  Recently, Dave Burke has been working on a CS Daily News FAQ which would cull items from the Community Server Daily News blog and itemize them […]
November 30, 2011

The Privacy and Security Implications of Misusing Technology

If you haven’t already heard of Carrier IQ, you need to do some serious web searching, as they are swiftly becoming the new name in technology misuse […]
March 31, 2012

Managing Your Personal Security

In the past few days, we learned that Global Payments Inc, a middle-man credit checking company, suffered a breach of its systems starting in January of this […]
May 22, 2012

Making the Most of Social and Professional Networking

As social/professional networking continues to proliferate, users and organizations alike, seek to find the ways to make the most of the growing trend.  A recent infographic shows […]
June 14, 2012

So, You Want To Be a Technology Consultant?

Doesn’t everyone want to be a consultant? Probably not…  There are some clear advantages to working for yourself, and there are some clear disadvantages. Likewise, there […]
June 20, 2012

I’m Tired of Registration Walls

Note to the heads of sales, marketing, and web site development: I’m tired of your registration walls (regwalls), and will no longer be supporting them. I […]
July 13, 2012

Dear Recruiter: Help Me Help You

As we head into the second half of 2012, I average about 3 to 4 calls/emails from recruiters per week.  In contrast to the overall job […]
August 14, 2012

Securing Your Storage – Part 1

If you’re going to make use of cloud-based storage, it is a good idea to ensure that you keep it secure.  Unless you are absolutely, positively […]
September 21, 2012

Why We Have No Online Privacy

Earlier today, as I read a very self-serving article lamenting how online growth will be killed due to impending “Do Not Track” legislation, it became very clear to me […]
November 30, 2012

Job Hunting: It’s All About Relationships

Earlier this week, I read an article about unemployment and the struggles of those coming out of college and graduate school who are seeking jobs. A […]
December 31, 2012

Get Real with Information Security

In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased […]
January 18, 2013

Reading Between the Lines of Breach Notifications

Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance […]
January 21, 2013

The Futility of Blaming IT

In recent years, it has become popular sport to blame information technology (IT) departments and IT leaders for failures – real or imagined – which adversely […]