Security is not just a state of being. We are often called to provide an assessment about our present security posture, and usually, the person asking the question is doing so within a very narrow context – one that the may or may not have shared with you. Answering...
Last time, I mentioned that inadequate planning is one of the key reasons why your new technology purchase might prove to be disappointing. This is true not only of planning that occurs once the project has been authorized and assigned an official “Project...
Technology continues to provide many benefits for individuals and businesses, and our increasing dependence upon it is a testament to its overall usefulness. Each day, many, many people make a good living from designing and deploying business solutions which are...
It has been said that technology in general, and automation in particular, simply make it easier for humans to propagate errors much faster than they could otherwise do so. This morning, I awoke to find that none of my scripts – on any of my machines – had...
Even on the smallest of networks, the failure to pay attention to every detail can make a routine upgrade or migration far more complicated than it needs to be. This year, I’ve had an above average number of mail server related incidents, but in many cases I made...
I had a chance to review the 2010 Verizon Data Breach Report today, which I was alerted to by ISC.SANS.ORG. They’ve put together data from 2004 through 2009, and it is quite interesting. These are from confirmed data breach cases. Here were 3 of the scariest stats in...