October 2, 2012 How much Risk Assessment is needed? In many of the InfoSec forums I subscribe to people regularly as the “How long is a piece of string” question: How extensive a…
November 30, 2011 On the HP Printer Hack The hack to make the HP printers burn was interesting, but lets face it, a printer today is a special purpose computer and a…
August 23, 2010 Beyond the signal-to-noise There’s a hump in the curve, way, way out beyond the six sigma point … Shea and Wilson were almost on it when the…
November 25, 2009 Unfortunately, SNMPv2 is not secure You betcha its not! There are GOOD practices for deploying SNMP. The BEST practice is to avoid V2. If you must SNMP then use…
November 18, 2006 Encyclopedia of IT terms CMP ChannelWeb have an on-line encyclopaedia of IT terms. This is a useful addition to my toolbar for composition, along with a more conventional…
October 21, 2006 The CISSP Forum FAQ Its one of those bootstrap problems – the new CISSPs who need to read the information can’t get at the FAQ on how to…