Categories ArchivesAdministration

August 2012 Roundup standard

What was popular in August? We sure had our fair share of speculation on Apple products including a big settlement that could have lasting effects on the mobile device industry. We had a new OS released (with a ton of side effects). RSA China came and went (one of the more challenging speaking gigs I’ve ever had), and RSA 2013’s CFP closed. And while summer is winding down, it’s clear that infosec is not done for 2012! Here are the five most popular posts from the last month: Mountain Lion Troubles and Solutions. In a departure from the norm, the top post this month is all about Mountain Lion. Some folks had no problems, others like me had massive issues. ...

Continue Reading

June-July 2012 Roundup standard

What was popular in June/July? First off, I was apparently too busy to put this together! I was lucky enough to get a vacation this year with the wife, and I sort of neglected this. No worries, we’ll make up for it! We had BlackHat/Defcon/BSidesLV, more suspected hacks (DropBox), and record heat across a large portion of the Midwest. As I’m writing this now, the thermometer is topping 110°F, but thankfully relief is in sight! Here are the five most popular posts from the last two months: Visa Kills PCI Assessments and Wants Your Processor to Support EMV. Another two months, another winner! Is this the end of PCI Assessments? Visa threw out some timelines and program details last year ...

Continue Reading

BlackHat 2012 time! standard

One of the industry’s favorite conferences descends upon Vegas this week, which means you will find all manner of individuals casually, theoretically, or maybe maliciously looking for ways to own you and your devices. It’s one of my favorite times of the year because the kinds of research presented at BlackHat changes how people interact with technology. Even Apple is presenting this year! I’ll be out there on Wednesday and Thursday, and would love to catch up if you have a few minutes. Definitely stop by the RSA booth tomorrow and pick up a bracelet for our EPIC party tomorrow night. I know some of our execs will be there, and I’ve been assured that one particular exec will “stick ...

Continue Reading

May 2012 Roundup standard

What was popular in May? We had Facebook all over the news (again) with its IPO woes, including lawsuits and 30% of the value of the stock eroded, the Call for Papers for RSA Europe closed, and RSA China opened, EMC World festivities in Las Vegas, and a whole host of product announcements to boot! Here are the five most popular posts from last month: Visa Kills PCI Assessments and Wants Your Processor to Support EMV. Another month, another winner! Is this the end of PCI Assessments? Visa threw out some timelines and program details last year that you need to know about. Top 10 PCI Requirements for Interpretation. I haven’t quite gotten ten yet, but I’ll start working through ...

Continue Reading

April 2012 Roundup standard

What was popular in April? We had Facebook all over the news with its billion dollar purchase of Instagram (do the math, $1B with 23 employees = some rich dudes) and IPO announcement, the Call for Papers for RSA Europe opened, and the security conversation seems to be continuing its momentum from RSA US! Here are the five (ignore the first one) most popular posts from last month: RSA Conference 2012, Are You Ready? OK, you guys, for real. I finally figured out why this was the most popular post. Barney Stinson is the reason. Go look at it and you will know why (and the search term that is somehow leading all kinds of unsuspecting people here). So I’m ...

Continue Reading

Herding Cats: A Curmudgeon’s Party Line (April 2012) standard

Have you checked out ISSA Connect yet? The next issue is up there with my column, A Curmudgeon’s Party Line. This month’s topic is quite timely as there have been several new attacks published related to SCADA and industrial systems. This article explores some of the reasons why we might see the marriage of IP-based systems with industrial systems causing issues today and in the future. If you are a member, log into ISSA Connect and join the discussion! Interact with great professionals globally as well as the authors that you enjoy reading every month. If you are not a member, sign up today! Possibly Related Posts: Top Posts from 2015 October 2015 Roundup September 2015 Roundup August 2015 Roundup ...

Continue Reading

March 2012 Roundup standard

What was popular in March? Breaches and advanced security and March Madness, OH MY! St. Paddy’s and spring break dominated most of the twitter discussions this month, although at the end we sure had a topic to discuss. More on that later. Here are the five most popular posts from last month: RSA Conference 2012, Are You Ready? I hope you made it out to RSA Conference this year. The buzz and excitement around the event of 20,000+ attendees was electric! Top Five PCI DSS Mistakes that Lead to a Breach. I wrote this blog post after speaking to several insiders about the challenges small companies face when it comes to complying with PCI DSS. Many of them look at ...

Continue Reading

Herding Cats: Hunt (March 2012) standard

Have you checked out ISSA Connect yet? The next issue is up there with my column, Hunt. Continuing on our thoughts from last month, security professionals must hunt for intrusions in their environment, not just wait for the phone call from someone telling them they have been breached. Gatherers have a role in information security, but so do hunters. If you are a member, log into ISSA Connect and join the discussion! Interact with great professionals globally as well as the authors that you enjoy reading every month. If you are not a member, sign up today! Possibly Related Posts: Top Posts from 2015 October 2015 Roundup September 2015 Roundup August 2015 Roundup June-July 2015 Roundup

Continue Reading

February 2012 Roundup standard

What was popular in February? RSA Conference was absolutely awesome this year. Not only was it packed, but the types of conversations we were having were much more security sounding (and less compliance sounding). Even the vendors on the edges (which is where the really good stuff is) talked about how valuable the show was for them. Here are the five most popular posts from last month: PCI Comliance For… The manuscript for the latest revision of the book is now complete! Here I reflect on a chapter I wrote about PCI Compliance for the Small Business. RSA Conference 2012, Are You Ready? I hope you made it out to RSA Conference this year. The buzz and excitement around the ...

Continue Reading

Herding Cats: No Bubble People (February 2012) standard

Have you checked out ISSA Connect yet? The next issue is up there with my column, No Bubble People. We must assume malware will end up in our network. Unless we treat our users like the Boy in the Bubble, they will click things and infect themselves—many times without even realizing it. This month’s column discusses the war we face understanding that we cannot fight or even win every battle. If you are a member, log into ISSA Connect and join the discussion! Interact with great professionals globally as well as the authors that you enjoy reading every month. If you are not a member, sign up today! Possibly Related Posts: Top Posts from 2015 October 2015 Roundup September 2015 ...

Continue Reading

This is a unique website which will require a more modern browser to work!

Please upgrade today!