The Disclaimer:
Just to be clear, nothing that I write here represents the position or opinion of my employer. Nothing I write here is proprietary or confidential to my employer. Everything I write here is my personal opinion.Pages
Subscribe to Security & Cigars
Follow me on Twitter
My Tweets-
Recent Posts
Archives
Recent Comments
- David Elfering on Back to Normal
- Terry Holberton on How To Get My Attention
- Vaughn Harring on Eric Update
- ecowper on Cigars
- Mike Childs on Cigars
Categories
- Alcohol
- Apple
- Being A Grown-Up
- Big Data
- Board Responsibilities
- BYOD
- Career
- Cigars
- Cloud
- Conferences
- Consumer Devices
- CyberWar
- Doing Adulting Right
- Food
- FUD
- General
- Government
- Health
- Home
- InfoSec
- Life and Times
- Military
- Mobility
- Pandemic
- Penetration Testing
- Please Advise
- Risk Management
- Security
- Smoking
- Teamwork
- Technology
- Travel
- Travel
- Uncategorized
- Vulnerability Management
Tag Archives: infosec
Information Security and Tanks
Not too long ago my good friend, Michael Farnum, invited me to be the closing speaker at HouSecCon. I told him I would love to … then he asked me to give a talk that involved my military experience and … Continue reading
Posted in Career, InfoSec, Life and Times, Military
Tagged Army, information security, infosec, Tanks
Comments Off on Information Security and Tanks
What Is A Good Security Program?
What distinguishes a good security program? One of the hardest questions to answer in the Information Security field is whether our security program is good, or not. It’s a question we want to answer for many reasons, not least of … Continue reading
Posted in InfoSec, Penetration Testing, Risk Management, Security, Vulnerability Management
Tagged APT, Gartner, Good Security, infosec, security, The Basics
Comments Off on What Is A Good Security Program?
Vulnerability Management Re-Visited
I know, boring topic. Just part of IT and Security operations. Nothing sexy here. It’s way more fun to think about how to beat those nasty, mean APT’s, how to detect malware actively on your network, how to do fancy … Continue reading
Posted in InfoSec, Risk Management, Security, Vulnerability Management
Tagged attack paths, ciso, Gartner, infosec, maturity model, TVM, vulnerability management
1 Comment
Blaming the Victim for the Crime
Putting the victim on trial. Decades ago we learned to stop putting victims of sexual abuse, domestic violence and rape “on trial”. Well, mostly anyhow. But we, mostly, stopped blaming the girl because she wore a short skirt or went … Continue reading
Posted in General
Tagged community, crime, cybercrime, fud, infosec, professional, security, victims
Comments Off on Blaming the Victim for the Crime
2013: A Roller Coaster
Or, as my wife put it, Random Ramblings of a Security Executive. Yes, it’s that time. Writing a blog post to wrap up the year, just all the rest of you do. I decided I’d cover my personal and professional … Continue reading
Posted in Career, Government, InfoSec, Life and Times, Security
Tagged 2013, 2014, CORE Security, cyber-, healthcare, infosec, personal life, professional life, security, travel
2 Comments
Back to Basics …. Again
It appears that the bad guys who exploited Adobe in August, and stole ColdFusion and Adobe (maybe) source code, as well as millions of credit card numbers, used a well known ColdFusion vulnerability. What seems to have happened is that … Continue reading
Posted in BYOD, InfoSec, Security, Vulnerability Management
Tagged Adobe, attack paths, ColdFusion, CORE Security, exploits, infosec, IT Operations, vulnerabilities
Comments Off on Back to Basics …. Again
Day 3 at CORE
Yet another day of fun at CORE today. Spent the day getting to know the people, figuring out critical strategies, and places where I can start inserting myself to have some immediate impact. Started working on goals for the next … Continue reading
Posted in CyberWar, FUD, General, InfoSec, Life and Times
Tagged back doors, cyber-security, cyberwar, encryption, infosec, instapundit, NSA, security
Comments Off on Day 3 at CORE
Gartner Security Summit Keynote
Paul Proctor got on stage and captured the attention of 2400 security professionals. He lampooned the NSA, brought the ghosts of security on stage and even highlighted my organization for the changes we’ve been able to accomplish. Key themes: BYOD, … Continue reading