… well, you know, we all want to change the world. Josh Corman from ISS/IBM is ready for change. He lays out a call to action over on fudsec.com. Lots of good comments over there. Here is my contribution: I…
Highlights
Social Networking Security
by admin •
Hang on, I’ll get to it after I get to the next level of Farmville…
Highlights
Best Practices for creating Best Practices
by Pete Lindstrom •
Given that best practices are here to stay, I thought it important to come up with a set of best practices for creating them: Don’t let the “practices” part of best practices get in the way. Best theories work just…
Highlights
Should you swap out Windows for better security?
by Pete Lindstrom •
Brian Krebs at Security Fix does excellent research into breaches, but I cringed when I saw his advice to “business owners” about how to protect themselves from cybercriminals: “The simplest, most cost-effective answer I know of? Don’t use Microsoft Windows…
Highlights
Information Systems Security Association
by Pete Lindstrom •
Highlights
The Question of Low Priced PCI Assessments
by Pete Lindstrom •
Branden Williams at Verisign (who has a great security blog, especially for its coverage of PCI issues) posts about a Bob Carr, Heartland Payment Systems, interview. The gist of the interview is don’t hire the low-cost bidder. Branden’s final comments:…