Plans are nothing; planning is everything

I think Eisenhower said it best when it comes to plans and planning. I think this also holds true for Business Continuity and Disaster Recovery planning. Without a proper process in place to support the organization in the event of some manmade...

/ October 17, 2011

Has it really come down to a bag of chips?

A recent vending machine company had some of its POS systems compromised at waterparks in Wisconsin and Tennessee. This was a major breach…up to 40,000! Go figure. People can’t even buy some snacks or what not from a vending machine without having...

/ September 20, 2011

Modernization is The Key

I had the chance to listen to the Chief Strategist of State Street Bank at the CIO 100 event. She was talking about the transformation of IT and the fact that State Street is constantly changing its IT infrastructure to match the...

/ August 30, 2011

Security Faux Pas

Organizations and the press do a pretty good job of keeping the average person aware of the latest big technology vulnerability or exploit.  And yet, we still see some common mistakes people make that could make them a susceptible to being exploited....

/ August 12, 2011

Too Extreme? I don’t think so. Tying security to compensation.

A colleague of mine recently posted a blog about the Black Hats getting the job done and rightfully so. Hackers have been pillaging the countryside lately. How many company compromises have there been over the last 3 months? More than there should...

/ August 8, 2011

Unique Requirements for Exchange 2010 Based Messaging Platform and Dependencies

In spite of the big inroads of various cloud based services in the messaging infrastructure space such as BPOS/Office 365, Google, many organizations continue to host their messaging infrastructure on-premise due to the unique nature of their requirements. Microsoft Exchange has made...

/ August 1, 2011

Configuration Management with System Center

“Change is the only constant” is especially true in the Information Technology space. There are many drivers to changes in the IT infrastructure space including newer application, need for productivity improvements, service level management etc. As per Wikipedia – “Configuration management (CM)...

/ July 13, 2011

Keep living in a fantasy world…

It will never happen to us. We know what we are doing. We are too small to be a target. Besides, we have a firewall, intrusion detection system and some really talented people in place to protect us from these so-called hackers....

/ July 11, 2011

The Softer Side of Information Security…

I recently went to a presentation at Norwich University in Vermont. Tom Peters was the speaker. For those of you that don’t know or recall Tom Peters, he is the guy that wrote a book back in 1982 called “In Search of...

/ June 30, 2011

The Black Hats Get It. Do you?

Billions of dollars and countless person hours have been spent on securing everything from the data center to the “endpoint.” And now we hear about the new “endpoints” entering organizations due to Consumerization in the form of tablets, Smartphones, etc. While the...

/ June 30, 2011