Security Leadership

Gas prices may go down and  electricity may get cheaper –   but In 2009, most of us  will have less money to spend and our clients will be tough on pricing and orders. For information security and compliance professionals it is the time to find, implement and enforce cost-effective security countermeasures. BUT HOW?

The worst bugs are the simplest bugs

It is a truism of security that the worst vulnerabilities are usually the simplest – many  are configuration bugs or simple design flaws like leaving temp files world read. Many Open Source projects such as Open Clinica use the excellent PostgreSQL database. You get 90% of Oracle at 10% of the weight and for free.   […]

Buggy software is risky software

Here’s a good example of post-hoc error and buggy software: Courtesy of my wife, from a Microsoft program they are using at work: –Microsoft help tip: “You might want to ask someone you know for help.” Danny Lieberman,  specialist preventing data loss because of buggy software and systems

Are you on your firewall, while your employees are on Gmail?

  Pop question No. 1: What percent of your employees send sensitive company documents  to their Gmail accounts? Pop question No. 2: When you layoff 15 percent of your workforce, should you fire the information security manager a) First, b) Last or c) Give her an incentive to help ensure that a data breach of […]

Agency Accidentally Posts Social Security Numbers Online

I  think the expression is – “the road to hell is paved with good intentions”. I got wind of this data breach event from the IS Alliance. As reported by WFTV Orlando – Social security numbers for 250,000 people were posted online by mistake, and a state agency is facing serious questions about why it […]

Great achievements involve great risk

Is it possible to have good kharma in information security – when you’re trying to keep the bad guys off your network (firewall, IPS) and keep the good suff inside (data loss prevention) and maintain good internal security (network surveillance)? I got a Powerpoint slide show in the email this morning from my friend Jeff […]

Netwitness – next generation network traffic analysis

Imagine Harrison Ford doing traffic analysis on your network. Hmm – there’s a thought. The US-based company – Netwitness has been making a lot of noise lately about their “next generation” capability to perform full session reassembly and threat analysis from packet capture. This is a great feature to have for traffic analysis that has […]

The death of risk assessment

We saw the movie “Blood Diamonds” last night;  the way some companies practice IT risk management reminds me of TIA – “This is Africa”.  Joseph Granneman talks about some of the problems with conventional IT risk assessment on Searchsecurity.com Risk assessment, as currently practiced in information security, is dead. I’m not saying we need to […]

Spector 360, data loss prevention tool?

Remember the “The  Phil Spector Sound”? (I grew up on rock and roll just outside of Philly and when you say Spector, I associate it with  Phil Spector or Arlen Spector – my mind is just wired that way…. A business partner of ours in a developing country asked me a security product question today. […]

Bank employee steals 100,000 sheqels

This is a classic case of trusted insider threat  – as reported by yesterday’s morning paper – “Israel Today”: ( i assume that this has been under investigation for a while so the actual event may have happened over a year ago…). The arrest sheet in the Tel Aviv district court depicts collusion between an […]