Posted on 2012-04-11 Think security’s too technical to teach to everybody? Think again. That misperception leads to a plague of problems, from USB-introduced viruses, to spending a fortune on fixing products after they’ve shipped. In this, the first in a series on teaching security to the nontechnical, I start with converting the security heathens. Read it [...]
Posted 03-02-12 Most businesses (93%!!!) have retention policies that dictate when and how to burn shit up. (Burn/delete/pulverize/whatever-ize.) Most businesses TOTALLY IGNORE THOSE POLICIES!! We made a nifty infographic to show how blasé we are about these matters. Check out the infographic on HPIO, then read the HPIO story about how to actually, you know, [...]
Posted 03-02-12 They spill out of milk cartons in unlocked storage rooms! They molder in storage facilities secured only by Yale locks! They get horizontally stripped into packing material that helpfully displays your customers’ names, SSNs, and dates of birth! It’s 2:34 a.m. Do you know where your business’s paper documents are?! Here we have horror [...]
If Anonymous, LulzSec et al. can pwn security vendors, who can protect us? Here’s help on how to rate security vendors on the sitting-duck scale. In this two-part look at how to vet security vendors, my first article—In God We Trust, but Security Vendors Need to Sign the Papers—focuses on assessing a vendor. This is done [...]
The cone of silence over WikiLeaks’ thousands of sources—many of whose lives are at risk if identified—has been shattered, all thanks to the most mundane, all-too-human security screwup imaginable. To wit: WikiLeaks founder Julian Assange wrote down the password on a piece of paper. Let us hope that this carelessness, this breathtaking lapse in security [...]
Mobile development’s the way to move. Nor will you starve if you’re picking up Java or Objective C. Check out the full story on the new Software Quality Connection site—is lovely, ya? Ya!
Windows 7’s DirectAccess is a win for users: convenient network access, no virtual private network needed. But it’s a stickier prospect vis-a-vis security and administration. For this IT Expert Voice article, I got input from LOPSA, an early Windows 7 user and Sophos’ Chester Wisniewski. Check out the full article here.