Assorted Links for April 27, 2013

Spend a few minutes reviewing 20 Critical Security Controls. Very interesting stuff. For example, #1 refers to having and maintaining an inventory of authorized devices/etc. Do you know all the servers running SQL and would you know if someone set up a new one? Add this blog about servant leaders to your reader if you’re […]

Read more "Assorted Links for April 27, 2013"

Looking Back

In July 2011 I took what felt like a big chance and a detour to lead a large and complex security upgrade for a large company. The project included replacing firewalls, re-ip’ing  hundreds of servers, implementing updates to hardening standards, updating application logging, and a lot more. A ‘lot more’ doesn’t really begin to describe […]

Read more "Looking Back"

Trust in Access

One of the minor features/quirks/annoyances of MS Access is that if you create a single macro or code module you get a prompt to ‘Enable Content’, designed to prevent malicious code from running without you knowing it. I tend to just leave it open for long periods and so it doesn’t bother me much, but […]

Read more "Trust in Access"

Trying the Nest Thermostat

I’ve had the Nest Thermostat on my wish list for a while. It has looked like an interesting bit of technology, just hard to justify the $249 price. This past week the little plastic nub that changes from AC to heat broke on my not-exactly-high-tech thermostat, so I decided to splurge and try the Nest. […]

Read more "Trying the Nest Thermostat"

2012 (2011) Data Breach Report

I had a chance over the weekend to finish reading the Verizon 2012 Data Breach Investigations Report. It’s a compilation of data about 2011 data breaches and they try to call out what they see as interesting in addition to showing a few different views of the data. It’s worth reading to get a sense […]

Read more "2012 (2011) Data Breach Report"