Computer experts in Novels

Computer experts in Novels

I have been reading the political-thriller novels of David Baldacci lately.  His novels are very good and very intriguing, and they are also generally very accurate.  Having said that, I want to point out that I am not writing this post to point out any mistake he made from a technical level (I have found …

Read More Read More

I hate when I do stupid stuff

I hate when I do stupid stuff

I hate when I do stupid stuff.  And it is even more embarrassing when it is a rookie mistake in front of a customer.  A client of ours bought a new Juniper SSG 320 firewall and a new Juniper SA2000 (SSL VPN).  One of our consultants has the firewall in place and working, but he …

Read More Read More

When money trumps ethics

When money trumps ethics

I just read this story over at Computerworld Outback (it’s not actually called that, but it IS in Australia).  It looks like there is another initiative for vote by their shareholders to get Google to quit censoring the Internet at the request of pinko-commie regimes like China.  There was a similar initiative last year that …

Read More Read More

Product Management Fusion

Product Management Fusion

I have noticed something lately that I am not sure means anything.  Basically, almost every security device and product manufacturer today have started settling on a similar management interface.  If it is a policy-driven device such as a firewall or IPS, many products have settled on the Checkpoint look and feel.  If they have a …

Read More Read More

The Power of Network Solutions to Censor

The Power of Network Solutions to Censor

Go take a look at Brian Krebs’ latest Security Fix post about Network Solutions censoring an anti-Islam website.  This issue is very controversial on both ends. If you don’t remember, it was about a year ago when a bunch of cartoons depicting Muhammad in a bad light were published in Danish and Norwegian newspapers.  Many …

Read More Read More

A List-Happy Blog

A List-Happy Blog

I was contacted today by someone from this blog at virtualhosting.com.  They asked me to link to one of their posts, which  I normally don’t do if I don’t know the blogger.  However, I got to looking through the blog, and I think it is worth reading.  Basically, they have a list of links for …

Read More Read More

Great Discussions at Security Catalyst Forums

Great Discussions at Security Catalyst Forums

If you are reading this post, then chances are that you have some interest in information security.  If so, then you will also have an interest in the Security Catalyst forums.  This is a treasure trove of information security discussions and the like.  One of the interesting questions posted yesterday was also linked by Michael …

Read More Read More

Trend Micro Website Was hosting Malware

Trend Micro Website Was hosting Malware

This is the kinda crap that makes people not want to trust the Internet at all.  Really, if you can’t trust an anti-malware company’s website, who can you trust? It’s really about being skeptical about the content you visit… That comes from Craig Schmugar, a threat researcher for McAfee Avert Labs.  I understand the sentiment.  …

Read More Read More

Chinese Conspiracy Theories Awake!

Chinese Conspiracy Theories Awake!

Found this compilation story of a lot of the infected computer products coming from China and Taiwan.   I have not done any confirmation of the details, but I believe all of these have been openly published in the media. This kinda stuff makes you want to break out the conspiracy theories big time.  But on …

Read More Read More

TRISC in April

TRISC in April

Here’s a heads up for those in and around Texas (I know that covers a lot of area).  The Texas Regional Infrastructure Security Conference (better known as TRISC) is almost here again.  The dates are April 21-23, and it is being held in beautiful and historic San Antonio.  Also, Fiesta San Antonio is happening during …

Read More Read More

IBM buys SSO Vendor Encentuate

IBM buys SSO Vendor Encentuate

Here’s the story. I haven’t looked at all the business logic here, but, I can speak to Encentuate as a product.  Their management was horrible, but they had VERY good stuff.  I tried and tried and tried to get them into my last job, but political crap got in the way.  I was working in …

Read More Read More

Data Protection is NOT A PRODUCT!

Data Protection is NOT A PRODUCT!

I am getting all the usual invites for every security company that exists in the world right now, asking me to meet with them at RSA (I have a press badge via the blog).  But what amazes me is how many of these companies want to talk about their new DLP product.  Websense bought Port …

Read More Read More

Gary Gygax is gone

Gary Gygax is gone

Some of my fondest memories were when I was playing Dungeons and Dragons as a kid and, believe it or not, when I was in the Army serving in the first Gulf War.  D&D was how I and 5 or 6 of my buddies passed the time while we either waiting for things to start …

Read More Read More

Making changes to the blog

Making changes to the blog

If you actually visit my site to read my thoughts (instead of just reading via a feed reader), you will notice some changes to the layout.  Actually, it is a big change.  I am one of those people who likes change (in certain aspects of my life anyway), and I was growing tired of the …

Read More Read More

BayouSec II Final Reminder

BayouSec II Final Reminder

OK people.  This is your final reminder.  BayouSec II is TONIGHT!!!  Don;t miss the fun and all the action!!  It will be a geek thrill ride!!!  Well, probably not a thrill ride, but food and drinks are good.  And some security talk to wash it all down. It is located at 1776 Yorktown, 7th floor, …

Read More Read More

LEGOS Review on Amazon

LEGOS Review on Amazon

My oldest son is a Lego freak.  He absolutely loves the stuff. So my wife goes out on the Internet (usually Amazon) from time to time to look for some good deals on the latest Lego sets.  One that my son has been looking at is the Mars Mission MT-51 Claw-Tank Ambush.  So my wife …

Read More Read More

Child Predators

Child Predators

I recently posted on my Computerworld blog about a task force being created to help child Internet safety.  One of the respondents to my post was from The Kristin Helms Internet Safety Foundation (or at least linked to the foundation in their response).  I have some recollection of that case, and it made me sick …

Read More Read More

BayouSec II

BayouSec II

The next BayouSec is going to take place at the new Alert Logic location on March 5 starting at 6pm. They have some conference rooms we can use. 1776 Yorktown, 7th floor. Just south of the Marathon Oil tower on San Felipe. We are going to start making this a tad more formal as far …

Read More Read More

Proofpoint getting some additional funding

Proofpoint getting some additional funding

Proofpoint Closes $28 Million Financing Round DAG Ventures Joins Email Security and Data Loss Prevention Leader Proofpoint’s List of Blue-chip Investors Sunnyvale, Calif. – February 27, 2008 – Proofpoint, Inc., the leading provider of unified email security and data loss prevention solutions, today announced that the company has closed a $28 million financing round, led …

Read More Read More

I’m an Official RSA 2008 Blogger!! WOO HOO!!

I’m an Official RSA 2008 Blogger!! WOO HOO!!

Looks like I have been elected as an Official RSA Conference 2008 Blogger!!!  Uhhh, probably along with every other blogger that is getting press credentials to the conference. 🙂  But they didn’t do that last year, and it comes with a cool graphic.  So I am putting it on my blog, damn it! Vet