Wednesday, December 30, 2009
Wednesday, December 16, 2009
DECAF
DECAF Link
Tuesday, December 15, 2009
ADOBE SECURITY LINK
Adobe Security Blog
Sunday, December 13, 2009
Cisco 2009 Annual Security Report
CISCO ANNUAL SECURITY REPORT 2009
Virtual Desktops Today - Cloud Claims
EyeOS
GHOST Cloud
Glide OS 3.0
Another challenging path to secure.
Tuesday, December 8, 2009
Google DNS or OPENDNS....Hmmmm
Google Public DNS Link here
Saturday, December 5, 2009
Cloud Computing - What we really should discuss
Wednesday, December 2, 2009
Saturday, November 14, 2009
Friday, November 13, 2009
Saturday, November 7, 2009
Microsoft releases free tool designed to harden software applications against attacks
Tool
More info here
Monday, November 2, 2009
Wednesday, October 28, 2009
Thursday, October 15, 2009
Microsoft Patch Tuesday Oct 13, 2009 Priorities
Those two technologies are addressed in MS09-054 (IE) and MS09-062 (GDI)”
I tend to agree here, as the GDI goes across multiple products, and we use IE everyday.
Monday, October 12, 2009
Format-Preserving Encryption (FPE)
Format-Preserving Encryption (FPE), Voltage SecureData maintains data format and eliminates
business process changes.
http://www.voltage.com/end-to-end/index.htm
Thursday, October 8, 2009
Google Apps Link for Outlook Clients
Take a look.
http://www.google.com/apps/intl/en/business/outlook_sync.html
Sunday, October 4, 2009
Thursday, August 13, 2009
Flash Cookies and What to Do
Firefox has an add-on Better Privacy you should consider as it removes these tracking elements.
Here is a terrific article from the guys in California.
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1446862
Friday, May 29, 2009
Tuesday, May 26, 2009
Data Protection Basics
1. Determine the critical data stores from a business perspective ( Rank your data's value)
2. Identify if the information in item 1 is data at rest or data in motion ( Classify the data type)
3. Determine if the data is on clients(pda's, laptops, servers), network ( communications streams), or hard prints. ( Discovery )
4. Align with financial or brand protection objectives
5. Put your requirements to paper
6. Evaluate your product space
7. Test in a controlled environment with test data!!
8. Deploy in production
Sunday, May 24, 2009
Product selection before strategy
It seems to be a recurring discussion i have weekly with peers. The topic tends to be the fact that products/services/technologies are purchased to solve risk and security issues before certain other considerations are complete.
The problem statement: How do we implement this product / solution into our environment.
One might think that a logical approach would be:
1. Strategy Formulation
2. Strategy Implementation/Communication
3. Architecture Review of AS-IS technology and process
4. Review of Strategy and Architecture TO-BE
5. Vendor review and selection
6. Implementation plans
Instead, Sales professionals do a great job of selling a product or service. Companies are then challenged to find a method for worrking on implementation. Basic issue step 6 before step 1-4 have occurred.
Providing technology solutions for problems and issues is only one component of solution delivery.
People, Process and Technology are all to be considered.
Blog Archive
-
▼
2009
(26)
-
▼
December
(9)
- A look at the infrastructure model behind Facebook
- DECAF
- ADOBE SECURITY LINK
- Cisco 2009 Annual Security Report
- Virtual Desktops Today - Cloud Claims
- Google DNS or OPENDNS....Hmmmm
- Cloud Computing - What we really should discuss
- IBM takes positive step forward with database secu...
- Report on TVA Information Security
-
►
October
(8)
- Forbes Video : The different roles of corporate se...
- Microsoft Patch Tuesday Oct 13, 2009 Priorities
- Customer Data Lost in the Cloud - An example of wh...
- Security First's - DataCentric Secure Parser
- Format-Preserving Encryption (FPE)
- Zeus Trojan Writeup
- Google Apps Link for Outlook Clients
- Windows 7 Applocker - a quick look
-
▼
December
(9)