14 Jun
2018

As we look to the future, our reliance on data is only going to increase. Technologies such as IoT, AI, robotics, […]

11 Jun
2018

Logs are crucial elements to breach investigations.  However, some investigations suffer from a lack of logs.  In such cases, the company […]

29 May
2018

The modern company thrives on data, yet some are also drowning in it.  The data that we find so precious […]

21 May
2018

I recently presented at the Duke Law EDRM on Cybersecurity and Law Firm Understanding Legal and Ethical Obligations.  Some questions […]

04 May
2018

Data, a crucial asset for the modern business, is under attack.  Data breaches, ransomware, employee theft, and mistakes can each […]

18 Apr
2018

Data is the building block of the modern business. It is essential for daily operations and ongoing commercial operations, but more […]

19 Mar
2018

The General Data Protection Regulation (GDPR) is set to go into effect on May 25, 2018, and yet many companies […]

15 Mar
2018

The zombie apocalypse is frequently mentioned in literature and pop culture.  Some have even taken steps to protect against this […]

08 Mar
2018

The need for patch management has repeatedly been demonstrated in recent years as companies large and small suffered data breaches […]

21 Feb
2018

It is healthy to take a step back from the technological changes of today to strategize on how the technology […]

12 Feb
2018

Cyber attacks on hospitals and other healthcare institutions have increased over the last 18 months, in part because they make […]

09 Feb
2018

There’s no doubt that cybercriminals are busy preparing more ransomware attacks for the remainder of 2018. And that ransomware code […]

05 Feb
2018

Companies experienced a deluge of cyberattacks in 2017 and the first part of 2018 has proven no different.  In 2016, […]

02 Feb
2018

In a world where many are battling corruption, Hasbro is doing the opposite.  The classic Monopoly game where players attempt […]

18 Jan
2018

Our companies and data are under an increasing assault from ransomware.  Its scale and scope have only grown as profits […]

08 Jan
2018

2017 was called the year of ransomware, but ransomware is showing no signs of slowing down.  Ransomware is expected to […]

25 Nov
2017

While blockchain has earned its most significant claim to fame by making possible the rise of cryptocurrencies like bitcoin, researchers […]

24 Nov
2017

Katie Niemi and Eric Vanderburg While being diligent with your online shopping is important and necessary, there are a few […]

16 Nov
2017

Many view the cybercriminal as an unknown.  This is due, in part, to the difficulty inherent in tracking down individual […]

15 Nov
2017

There are two ways to think about the European General Data Protection Regulation (GDPR), set to go into effect in […]

10 Nov
2017

This technological era is one that changes rapidly and so do defense strategies.  In the ancient world, combat strategies might […]

06 Nov
2017

The General Data Protection Regulation (GDPR) is set to go into effect on May 25, 2018, and yet many companies […]

03 Nov
2017

As the size of the Internet of Things (IoT) continues to grow, so too do the potential security risks for […]

02 Nov
2017

In recent years, there has been a fundamental change in both the scope and scale of cyber threats to critical […]

17 Oct
2017

The wildfire that ripped through California in early October caused tremendous damage and the loss of over 30 lives.  So […]

03 Oct
2017

Cybercriminals use phishing emails with malicious links or attachments to distribute ransomware more than any other method. Their goal is […]

29 Sep
2017

The WannaCry ransomware attack earlier this year infected more than 230,000 computers in 150 countries within one day of its release. It received […]

27 Sep
2017

Defense Federal Acquisition Regulation Supplement (DFARS) clause 225.204-7012 was established in 2015 to protect Controlled Unclassified Information (CUI).  CUI is […]

28 Aug
2017

Ransomware, the malicious code that holds data hostage, is now a more common threat to businesses than data breaches. It […]

24 Aug
2017

The costs associated with a ransomware attack are often viewed from two dimensions: On one side, there is the ransom […]

14 Aug
2017

Some ransomware are strategically designed to cause as much damage as possible while producing large profits for cybercriminals. And the […]

Linux Ransomware
10 Aug
2017

Linux is an open-source operating system that is very versatile due to the large group of volunteers that maintain and […]

08 Aug
2017

Cybersecurity challenges companies, countries, and individuals to continually improve protections against an enemy that wants our secrets, money, and identify.  […]

Privacy is not dead
31 Jul
2017

An acquaintance from a younger generation said to me one day, “Don’t you know that privacy is dead?” I was […]

24 Jul
2017

Most people will never have a fire in their home or office, but everyone can remember going through a fire […]

17 Jul
2017

The process of making sure your business is prepared to protect its data from ransomware and other disasters depends largely on the […]

12 Jul
2017

Virtual reality has received a lot of attention lately, but there is much to be said for Augmented Reality (AR) […]

26 Jun
2017

A new ransomware do-it-yourself kit called Karmen is making it easy for wannabe cybercriminals to launch ransomware attacks. Security researchers […]

19 Jun
2017

With the upcoming onset of the GDPR, many companies are seeking to leverage their cloud services for GDPR compliance. Companies […]

12 Jun
2017

The General Data Protection Regulation (GDPR) is the latest in a host of rules designed to protect privacy.  It is […]

07 Jun
2017

Apple Inc. has a reputation for building secure devices, but don’t become too complacent because ransomware threats to Mac users […]

19 May
2017

Pavan Belagatti and Eric Vanderburg Early DevOps adopters have proven DevOps to be more than just a cultural shift or […]

01 May
2017

For decades, the printer has been the intermediary between the digital and physical worlds.  Through it, our creations become tangible […]

24 Apr
2017

There are a variety of different ransomware variants that encrypt your data with no intention of ever decrypting it. There […]

18 Apr
2017

When it comes to ransomware attacks, those who lose valuable data and have no viable backup tend to pay the […]

17 Apr
2017

The repeal of the FCC Internet privacy rules has spurred on many discussions on privacy online and how companies collect […]

13 Apr
2017

I recently did an interview with Karen Marcus for Careers in Cybersecurity on education, career development, and cybersecurity career success.  […]

07 Apr
2017

Spora is a relatively new ransomware, but there are signs which indicate that it could become a major player in […]

06 Apr
2017

Bring your own device (BYOD) policies are commonplace in many organizations today. Employees bring in their personal cell phones, laptops, […]

03 Apr
2017

Ransomware is infecting the computers of unsuspecting victims at an astronomical rate. The various methods that cybercriminals use to take […]

17 Mar
2017

The insider is still one of the most vulnerable elements of cybersecurity.  Insiders are those who are authorized to work […]

15 Mar
2017

I recently did an interview with JAX Magazine on DevOps and here is the transcript of the interview. Some people […]

01 Mar
2017

Cybercriminals extorted about one billion dollars from ransomware victims last year, according to the FBI. And nearly all of those […]

18 Feb
2017

If we have learned anything over the last few years about data breaches, it is that they are likely to […]

23 Jan
2017

People charged with filling career positions at their companies need to be on the lookout for ransomware, especially GoldenEye ransomware. […]

13 Jan
2017

PopcornTime is a newly-discovered form or ransomware that is still in the development stages but operates off a disturbing principle: […]

16 Dec
2016

Two email accounts of a ransomware distributor were recently compromised. The analysis of these accounts gives an interesting “behind the […]

09 Dec
2016

Cybercrime is very much a psychological game and ransomware is no exception. Psychology plays a major role in almost all […]

08 Dec
2016

This past year, ransomware has extorted vast sums of money from enterprises.  Ransomware is a form of malware that encrypts […]

05 Dec
2016

Machine learning is a science that uses existing data on a subject to train a computer how to identify related […]

01 Dec
2016

Ransomware continues to be a huge problem for companies and consumers—and a major source of income for cybercriminals. Malicious hackers […]

25 Nov
2016

In the world of technology, paradigms shift quickly.  Not long ago, we focused organizational security efforts on the perimeter of […]

23 Nov
2016

The latest version of Cerber ransomware is targeting database applications and putting business’s most valuable data at risk, according to […]

22 Nov
2016

Security software companies and research organizations are collaborating to break the encryption codes of ransomware variants and free those who […]

08 Nov
2016

Ransomware computer viruses are becoming more sophisticated—and so are the attacks that make use of ransomware. In some cases, ransomware […]

07 Oct
2016

Ransomware infections are becoming increasingly commonplace, and companies that put a plan together before an incident are much more effective […]

06 Oct
2016

As if encrypting your individual files was not enough, a recently discovered ransomware called Mamba encrypts your entire hard drive. […]

21 Sep
2016

The news is crowded with reports from noteworthy companies of cyber-attacks.  Last year was the year of the data breach […]

07 Sep
2016

People are the core of any incident response effort.  You must have the right people to provide the right response.  […]

02 Sep
2016

We all know money is the motivating force behind cybercrimes like the creation and distribution of ransomware. The interesting twist […]

30 Aug
2016

A Pokemon Go themed ransomware virus has appeared on Windows computers, tablets, and phones. The ransomware is the latest in […]

25 Aug
2016

The average company today is a hybrid collection of traditional on-premise and cloud-based IT solutions.  On-premise solutions may include identity […]

17 Aug
2016

Ransomware creators are monetizing their software in creative new ways. Not only are they using ransomware to encrypt files and […]

10 Aug
2016

The US presidential election is upon us and some political activists are out in the streets, and in convention halls. […]

25 Jul
2016

Criminals are raising the bar in the fight for your money.  It’s natural to expect that competition would follow success—and […]

19 Jul
2016

It might surprise you to know that ransomware uses geolocation technology to customize payloads and target individuals. You probably already […]

13 Jul
2016

Ransomware is the quickest way to turn your valuable data into garbage.  Ransomware is a form of malicious software that […]

01 Jun
2016

Businesses today can’t exist without data. They feed on it, breathe it, and those that understand how to most effectively […]

10 May
2016

Storage solutions make or break the systems they support and yet these same systems are routinely seen as a cost […]

22 Mar
2016

The concept of identity is core to the protection of data.  Data and other computing resources exist to be used […]

12 Feb
2016

Ransomware is an evolving malware threat.  Where once malware was predominantly an inconvenience, ransomware takes aim at data, the lifeblood of […]

06 Jan
2016

We may not be using more of our brains but we can probably use more of our data. Did you […]

22 Dec
2015

2016 is going to be a big year for security. News of data breaches and the major technological innovations of […]

12 Dec
2015

Spoiler alert for all my regular cybersecurity readers: this is a post about audio, not security.  Check back in a […]

04 Dec
2015

You probably remember Microsoft’s announcement for their augmented reality or mixed reality hardware called HoloLens which occurred around the announcement […]

24 Nov
2015

This is the start of the season. No, I am not talking about the Christmas season or the shopping season. […]

24 Nov
2015

CDW asked me what my must-have products were for #Techsgiving sweeps and I have to say the choice was rather […]

19 Nov
2015

This statement may be familiar to many who have considered cloud services and it was both the start and end […]

10 Nov
2015

The maturation of the cloud is fascinating as it continues to adapt, providing more opportunities for companies and consumers to […]

09 Nov
2015

I used to be agitated by the sound of the phone. My wife and I both have cell phones but […]

04 Nov
2015

Shortcuts, as the name implies, are key combinations that you can press on your keyboard to perform semi-complex actions.  These […]

29 Oct
2015

Security is a growing field, and with its growth come many different career options. As you gain experience in different […]

27 Oct
2015

I was recently asked the question, Can eDiscovery systems prove the integrity of the email that they discover? If so, […]

20 Oct
2015

Information security is often described using the CIA Triad. The CIA stands for Confidentiality, Integrity, and Availability and these are […]

15 Oct
2015

Do you know why all the major online retailers offer a way for users to review products? It’s because people […]

22 Sep
2015

Anonymity has been a longstanding hallmark of the Internet but you should no longer assume that your online activities are […]

08 Sep
2015

New graduates are in a tough spot, especially those interested in cybersecurity. A majority of cybersecurity positions require one or […]

31 Aug
2015

The Internet community grows larger everyday as more and more devices are attached to it. These devices increasingly include not […]

14 Aug
2015

Microsoft officially launched its successor to Windows 8.1, Windows 10, on July 29, 2015, and millions have already downloaded this […]

15 Jul
2015

In 2014, the Identity Theft Resource Center (ITRC) tracked 783 data breaches with 85,611,528 confirmed records exposed. This year appears even more […]

22 Jun
2015

Some breaches require notification such as those involving patient data or customer information, but sharing is optional. Of course, notification […]

15 Jun
2015

We are getting closer and closer to virtual reality.  Some companies such as Google and Oculus have already produced virtual […]

13 Jun
2015

A relatively new term has entered into our vocabulary; Internet of Things (IoT).  IoT refers to any device that is […]

11 Jun
2015

I was talking to Mark Schaefer and he said that SEO content today is about insight rather than quality.  This […]

18 May
2015

New and creative security threats may grab headlines, but smart security practitioners know that many attackers still rely on the […]

11 May
2015

Last week I was walking down the street with a friend and a guy and a girl yelled over to […]

07 May
2015

In 5 to 10 years, the cloud will be as ubiquitous as the Internet is today. It is predicted that […]

03 Apr
2015

With the ease and prevalence of global expansion, security leaders must understand how to implement security across a global organization […]

13 Mar
2015

Successful security leaders demonstrate their effectiveness through metrics. Metrics are used more and more as security executives emulate the way […]

24 Feb
2015

As vigorously as many organizations are working to prevent them, data breaches are becoming more of a common occurrence, and the consequences […]

18 Feb
2015

In childhood I dreamed of a world quite grand Where my name and face were far from mystery A life […]

09 Feb
2015

It is easy to get down or even depressed with the focus on negatives in the news and in conversation.  […]

03 Feb
2015

Security spending could be compared to the stock market. It increases and decreases depending on intangibles such as how “at-risk” […]

14 Jan
2015

I always figured that you would need to know what you have in order to protect it. However, I have […]

06 Jan
2015

We’ve seen quite a variety of online threats recently. A simple email containing a convincing subject line can compromise a […]

23 Dec
2014

The cloud has received a lot of negative press from security professionals and, I have to admit, we’ve come off […]

09 Dec
2014

It seems like security practitioners are still saying the same things they said ten years ago. Use complex passwords. Change […]

04 Dec
2014

Do you conduct debriefing sessions after completing a cybersecurity project? Quite often, our minds are moving on to the next […]

02 Dec
2014

As an organization becomes more conscious and engaged in protecting information, it progresses along a path of security maturity. I […]

26 Nov
2014

Join the Cleveland Metropolitan Bar Association Business, Banking & Corporate Counsel Section on Thursday, December 11, 2014, for a panel […]

25 Nov
2014

As hard as it is to believe, 2014 is almost at a close. While some think about Holiday gatherings and […]

08 Nov
2014

I welcome you to join me on November 8 at Grace Baptist Church of Westlake for the Untangled Conference.  I […]

31 Oct
2014

An estimated 5% of annual corporate revenues are lost each year to fraud, represented in part by computer fraud. Protection […]

23 Oct
2014

I was asked a question on Twitter today. The question was, “Is staying safe online possible?” This is a great […]

14 Sep
2014

The Value of Big Data Accenture released the findings of their big data study on September 10, 2014, and it […]

07 Aug
2014

The largest internet security breach in history has just been discovered. Hold Security, a small cybersecurity firm, first reported the […]

16 Jul
2014

I was recently listed as the number 10 information security leader to follow on Twitter in Information Security Buzz’s 25 […]

14 Jul
2014

Security breaches and identity theft are becoming an increasing concern for consumers as hackers continue to target large retailers. Target, […]

19 Jun
2014

A botnet or zombie army is a group of computers – with their owners unaware of it – that is […]

28 May
2014

The power supply and control panel for this Dell PowerVault 124T tape autoloader failed with a tape in the drive.  […]

21 Apr
2014

I want to thank Amber Newby for listing me as the number 11 person on Twitter aiding against identity theft.  […]

18 Jan
2014

I was recently the keynote speaker and the IT professional development event hosted by Cuyahoga Community College and the Helpdesk […]

13 Dec
2013

Twas the night before the breach, when all through the place Not an alarm was ringing, nor even a trace […]

03 Nov
2013

I appeared on the Sound of Ideas program on National Public Radio channel 90.3, WCPN on November 3.  In the […]

15 Aug
2013

I was talking with a client about multifactor authentication and they wanted a demo of what that looked like so […]

27 Jul
2013

I was honored to be able to address the final graduating class at Remington College’s campus on the West side […]

16 Jul
2013

Vanderburg was recently listed as the number 10 information security leader to follow on Twitter in Information Security Buzz’s 25 […]

27 Jun
2013

Security remains a complex discipline.  This ever-changing challenge grows in complexity daily as new threats emerge and compliance requirements increase.  […]

23 May
2013

I watched the XBOX One launch video today on my XBOX 360 console dashboard.  It is impressive in some ways […]

22 May
2013

Social networking is my thing this year and I just wanted to share my strategy with you in case you […]

15 May
2013

There are so many ways to share on social media today and users, especially the younger generation, are sharing almost […]

10 May
2013

On May 9, 2013, Federal prosecutors issued indictments against eight individuals for hacking and theft.  The case revealed the methods […]

02 May
2013

The Electronic Frontier Foundation issued a report on 18 web and technology companies that routinely handle data.  The study looked […]

24 Apr
2013

The Florida Department of Juvenile Justice (DJJ) had a mobile device containing 100,000 youth and employee records stolen on January […]

03 Apr
2013

Salem State University in Massachusetts issued a data breach warning to faculty and students on March 11.  The warning informed […]

20 Mar
2013

I will be presenting at the ISACA CPE & Social Event – Cyber Forensics & Cleveland Cavaliers vs. Miami Heat […]

13 Mar
2013

On March 8, 2013, a contractor working for North Carolina’s Department of Health and Human Services (HHS) billing department stored […]

07 Mar
2013

A recent study by Deloitte, titled Blurring the lines: 2013 TMT global security study, shows that 59% of Technology, Media, […]

28 Feb
2013

Some have emailed me asking why criminals would even care about Personal Health Information (PHI).  Sure, it’s private information but what […]

20 Feb
2013

The EU Information Commissioner’s Office (ICO) has stated with its recent fine for Sony of £250,000 that lack of knowledge […]

14 Feb
2013

President Obama signed an executive order on February 12, 2013, that requires federal agencies to share information on cyber threats […]

05 Feb
2013

Two weeks ago hackers took control of 14 servers and 20 workstations at the U.S. Department of Energy (DOE), obtaining […]

30 Jan
2013

The Department of Health and Human Services (HHS) released the HIPAA Omnibus rule on January 17, 2013, designed to give […]

24 Jan
2013

I had an awesome time with you all. Thanks for making it a great LAN party.  Here are a few […]

23 Jan
2013

Back in November, I blogged about the hack back initiative here in the United States.  Well, similar debates are taking […]

20 Jan
2013

Are you ready for some great PC gaming? Bring your computer to VandyLAN 8 where we will game all day […]

17 Jan
2013

On January 2, 2013, the Department of Health and Human Services (HHS) fined the Hospice of North Idaho $50,000 for […]

09 Jan
2013

Security researchers have identified a new malware called Dexter that specifically targets Point of Sale (POS) systems such as cash […]

03 Jan
2013

It is easy for miscommunication to happen after a data breach.  There could be many people working on the incident […]

21 Dec
2012

Here is a fact that many of us would like to forget.  Most data theft occurs by insiders.  This is […]

19 Dec
2012

Recent research shows that hospitals are the highest risk for data breaches.  The third annual benchmark study on patient privacy […]

14 Dec
2012

Our Security Operations center keeps track of a lot of information.  Here are two workspaces in the SOC.  Let me […]

12 Dec
2012

A recent finding by Gartner titled “Using SIEM for Targeted Attack Detection” is that 85% of breaches go undetected.  Those […]

05 Dec
2012

Government regulation, including the well-known HIPAA and GLBA, are quite clear on the notification requirements for businesses suffering a data […]

29 Nov
2012

Like paparazzi on celebrities, hackers pound on our organizational doors almost every second of the day.  It makes us want […]

14 Nov
2012

Data breaches are occurring more frequently and companies are searching for a way to help prevent the breach by understanding […]

07 Nov
2012

On October 10, the Secret Service’s electronic crimes task force discovered that the South Carolina Department of Revenue’s systems were […]

02 Nov
2012

An organization’s security culture in relation to information security determines how receptive employees will be to security initiatives.  Culture can […]

24 Oct
2012

At the upcoming Information Security Summit, I will be presenting on the topic, “Eradicate the Bots in the Belfry.”  Bots […]

18 Oct
2012

A recent survey of small business owners showed that while 77 percent believe that security is important for their company’s […]

08 Oct
2012

Last month, Senator John D. Rockefeller IV, Chairman of the U.S. Senate Committee on Commerce, Science and Transportation, sent the […]

03 Oct
2012

Did you know that computers often become infected with virus-like programs called “bots” causing “denial of service” incidents on websites? […]

26 Sep
2012

Many people have asked me how to reset their Windows password so I decided to write this blog about it.  […]

19 Sep
2012

Every once in a while, a website will try to convince you to change your security settings.  I was looking […]

18 Aug
2012

A few months ago I discussed the sale of zero-day exploits. The Zero-day exploit trade is a new market; increasingly […]

04 Jul
2012

As we think of today, our Independence Day, consider also the information security and cyber security professionals who guard our […]

21 Jun
2012

It seems no matter where you turn; someone is waiting to rip you off.   Our inboxes drown in spam and […]

Data Classification
14 Jun
2012

Data classification is a term that is not usually associated with the small business.  It tends to invoke thoughts of […]

08 Jun
2012

While many people think that a person’s social media posts, photos, and conversations are protected as private information, especially if […]

07 Jun
2012

Social engineering is the art of manipulating people into giving up confidential information. The types of information social engineers seek varies, […]

23 May
2012

  Managing the security of an organization can be quite confusing. It can seem like an uphill battle when basic […]

03 May
2012

Public clouds have been greatly promoted as an approach for organizations to reduce information technology (IT) costs and increase technology […]

10 Apr
2012

If you had a breach of your most sensitive data tomorrow, how much would it cost you?  There are quite […]

12 Mar
2012

The phrase “Knowledge is power” has never before become so clear and scary.  The knowledge that is kept secret can […]

16 Feb
2012

Historically, ecological concerns have been significant drivers for change.  Topics ranging from global warming to protecting various species carry a […]

09 Feb
2012

For more than a decade, computer-generated digital certificates have made it possible to authenticate the identity of computer systems, data, […]

03 Feb
2012

Gerald Wilde had a theory called risk homeostasis.  This theory hypothesizes that people have a level of acceptable risk.  When […]

26 Jan
2012

The latest televisions and Blu-Ray players come equipped with more than HD video and audio.  Internet access and a host of […]

19 Jan
2012

Organizations are accumulating data at a pace that would cause a hoarder to blush.  Just like that old bicycle seat […]

07 Dec
2011

ISO 27000 is a set of security standards that organizations can implement to provide an industry-recognized minimum level of security.  […]

01 Dec
2011

The site is down!  These are haunting words for most businesses, and today’s topic: the DDoS (Distributed Denial-of-Service) attack. This […]

19 Nov
2011

If you want to create an EXE, executable file, from a batch file or VBS file, these two programs will […]

16 Nov
2011

Data breaches and security incidents are a significant risk for organizations and some are using cyber insurance to transfer the […]

27 Oct
2011

Losing data can be tremendously devastating to a company. It could compromise security, information, and jobs. Today, we will look […]

20 Oct
2011

As you laugh at my title, anticipating several paragraphs of satire, think about what I’ve just said because I’m serious…to […]

12 Oct
2011

The use of SIEM, DLP, and IAM can significantly enhance the capabilities of information security departments. SIEM allows a company to […]

06 Oct
2011

Imagine a boardroom a generation ago.  Smoke fills the air, and sidebar discussions thrive while the board members wait for […]

29 Sep
2011

Scams exist.  That is a simple truth.  There are honest people, and then there are others who try to cheat.  […]

23 Sep
2011

Previously, we have discussed the dangers of hacking and measures to take against an attack in the LulzSec blogs.  Now […]

15 Sep
2011

PCI applies to a wide range of corporations and companies that deal with credit card transactions, and it can be […]

08 Sep
2011

HIPAA is regulation intended to help covered entities and their business associates protect Electronic Protected Health Information (ePHI).  The U.S. […]

31 Aug
2011

Information security is often feared as an amorphous issue that only the IT department has to deal with. The reality […]

24 Aug
2011

“Thinner. Lighter. Faster. Facetime. ” That is the catchphrase from the Apple page dedicated to the iPad. While Apple is […]

18 Aug
2011

Thank you for staying tuned into our third case study and final installment of our four-part series on the Lulz […]

15 Aug
2011

This post is the third part of a four-part series on the LulzSec hackers. Our first entry titled “Awareness Pains: […]

03 Aug
2011

As promised, here is the first case study regarding the events surrounding the Lulzsec group. If you are reading that […]

21 Jul
2011

Bob set down the phone with a sigh. After six hours, five phone calls, countless emails, and two meetings, it […]

14 Jul
2011

Social Networking is a godsend and concern, a help and a hindrance, an amazing feat and a terrible nuisance. While […]

01 Jun
2011

We have worked hard to educate users of the need for computer hygiene, using anti-spyware, multiple browsers, data backups, and […]

10 May
2011

Corporate espionage is not just a plot for action movies; it is a real threat to small and large businesses.  […]

21 Apr
2011

The average organization has numerous types of equipment from different vendors. Along with the equipment, businesses also utilize multiple software […]

22 Feb
2011

Change management is a key information security component of maintaining high availability systems. Change management involves requesting, approving, validating, and […]

01 Feb
2011

Hackers often bypass some of the best security technologies by exploiting one of the oldest tricks in the book, your […]

25 Jan
2011

Briefcase chained to his wrist, the officer cautiously looks for anything out of the ordinary as he makes his way […]

05 Jan
2011

Do you think there is a right way to crash?  A system crash sounds like a bad thing all around, […]

29 Dec
2010

Many organizations use Cisco devices to interconnect, protect, filter, and manage networks so it is important to understand ways to […]

22 Dec
2010

Joy to the World the Lord has Come! As we approach the celebration of our Savior’s birth, our minds think […]

10 Dec
2010

An information security risk assessment is the process of identifying vulnerabilities, threats, and risks associated with organizational assets and the […]

15 Nov
2010

Information security policies and security awareness go hand in hand. Frankly, a policy is worthless if it sits on someone’s desk. […]

12 Nov
2010

Since many organizations are rapidly virtualizing servers and even desktops, there needs to be direction and guidance from top management […]

29 Oct
2010

Data Loss Prevention (DLP) is one of those terms that is often mentioned but less often defined. The term can […]

07 Oct
2010

Companies collect millions of gigabytes of information, all of which has to be stored, maintained, and secured. There is a […]

27 Sep
2010

Virtualization has really become a mainstream technology and an effective way for organizations to reduce costs. Virtualization simplifies processes but […]

10 Aug
2010

Virtualization is an excellent way to make better use of existing IT resources but utilizing them for multiple tasks.  It […]

15 Jul
2010

For those of you using Microsoft’s Data Protection Manager and Exchange Server 2007 SP1 x64, you will definitely want to […]

15 Jul
2010

The biofilters from Star Trek may some day become reality.  The Star Trek biofilter is a device that scans for […]

09 Jul
2010

Snapshots are a valuable feature virtualization offers business continuity. Organizations can create point-in-time recovery points numerous times a day by creating […]

29 Jun
2010

Aimee and I use my home theater a lot and so when my DVD player started skipping on disks I […]

16 Jun
2010

Microsoft released one of the greatest gaming controllers with the Strategic Commander back in 2001.  The controller fits perfectly in […]

07 Jun
2010

Business continuity plans are designed to define the processes necessary to protect organizational assets and to keep the business running in […]

18 May
2010

I have been struggling with some ASP AJAX code.  I moved a .NET site from Server 2003 32-bit IIS6 to […]

Pyramid Scheme
16 May
2010

There are many new threats on the Internet, but that doesn’t mean criminals don’t try the tried and true methods […]

08 May
2010

I was honored to be selected as the commencement speaker for Vatterott College’s 2010 graduation on May 8.  It was […]

12 Feb
2010

Security policies and security awareness go hand in hand.  Frankly, a policy is worthless if it sits in someone’s desk.  […]

20 Dec
2009

REJOICE! A Savior is Born! The last of the vibrant colors of fall are still clinging to the trees as […]

21 Nov
2009

Despite the name, money mules are not good.  Money mules are people who are duped into laundering money for criminal […]

Computer Forensic MAC Times
10 Oct
2009

I was explaining some computer forensics topics to a customer the other day and I was asked what MAC times […]

20 Jul
2009

I wanted to remind you that this Saturday, July 25 from 12:00 Noon till 12:00 Midnight is VandyLAN 7.  I […]

19 May
2009

Do you want to hear something funny? I have been writing a lot lately and the words were just flowing […]

15 May
2009

I have been working on a fantasy novel for the past few weeks.  I haven’t exactly followed good writing principles […]

13 Mar
2009

I will be joining Pei-Ying Lin at Cleveland State University today to present on Virtualization for Competitive Advantage.  Virtualization can […]

29 Jan
2009

The Patriot Act allows the government to classify unruly activity by passengers on airlines as acts of terrorism. Some individuals […]

17 Dec
2008

Merry Christmas and Happy New Year. It is hard to believe that a new year is on the horizon once […]

15 Sep
2008

I read an article by Bruce Schneier called Security ROI in CSO magazine. Here is an excerpt from it: “Assume […]

28 Aug
2008

Have you ever completely forgotten how to do something until you just started? As a cybersecurity professional, I find that […]

22 Aug
2008

So I was working on a problem at work today.  We can only copy 4000 files at a time and […]

19 Aug
2008

In a 2008 blog entry by Steve Clayton at Microsoft, he mentions the five things he looks for in candidates when […]

19 Jun
2008

At the incident response workshop I ran, we talked through a data breach caused when private data on an FTP […]

17 Apr
2008

Full-text searching allows more complex searches such as word or phrase searching, inflection matching, proximity searching, and relevance matching to […]

12 Mar
2008

Phishing schemes abound, but many use some form of the irresistible offer.  In this type of phishing, this dream of […]

02 Feb
2008

It has been a while since I posted anything about the arcade machine and for good reason.  It has been […]

17 Dec
2007

Last month my fish tank sprung a leak. I have a 775-gallon bow-front aquarium so it made quite a mess. […]

15 Jun
2007

Phishing has finally gotten more interesting.  I am tired of the Nigerian phishing schemes that continually enter into my mailbox.  […]

07 Jun
2007

I haven’t used a webcam for years but I have never been on to follow the trends. It might seem […]

20 Apr
2007

There are quite a few upcoming things on the agenda. My article”Implementation to Instruction – Is teaching next in your […]

22 Feb
2007

Even Macs age and eventually need to be replaced.  If you are planning on giving your Mac away, it is […]

20 Oct
2006

I am always on the lookout for new programs that can solve my problems for free.  My copy of Nero […]

06 Oct
2006

I wanted to comment on an odd form of communication.  I looked at the writing inside the bathroom stall today […]

16 Sep
2006

Should cybersecurity be a global strategy?  This is an interesting question because cultures, environments, and regulatory environments differ around the world, […]

14 Sep
2006

I have not posted in a while because things have been so busy.  I think I will change the direction […]

08 Sep
2006

My Brother and Friend Eulogy for Justin Vanderburg by Eric Vanderburg September 6, 2006 I could ask for no better […]

21 Aug
2006

Cybersecurity benchmarking is an excellent way to make improvements in cybersecurity practices.  Benchmarking is an activity that compares a business’s […]

17 Aug
2006

Today is my last day teaching at Remington College.  I was asked not to tell the students until today.  It […]

22 Jul
2006

This is the list I am starting of good Firefox extensions.  Each of these is one I would highly recommend. 1. […]

05 Jul
2006

As you likely know, China filters Internet traffic coming into their country.  There is some content that they do not […]

29 Jun
2006

I am happy to announce that I passed another certification test – actually two of them.  I took the MCDBA […]

26 Jun
2006

I looked at my Google search history today.  Google tracks each search that you make when logged in with your […]

26 Jun
2006

Tech Blog has compiled a list of the top 10 strangest Japanese gadgets and accessories. Check it out. It is […]

26 Jun
2006

Ian gave me the latest Beta of Windows Vista. I have the 64-bit edition and I hope it will work […]

19 Jun
2006

Ian got me the four Microsoft guys from the Source Force. I gave a few of them different names when […]

18 Jun
2006

I found the issue with Aero Glass that I reported earlier. The reason why Aero Glass fails sometimes is that […]

18 Jun
2006

I used to recommend Auditor for security testing through Linux.  Auditor was similar to Knoppix, the bootable “live” version of […]

16 Jun
2006

When I first tried Vista last week I wondered why MSN Messenger was not bundled with the operating system.  I […]

13 Jun
2006

I came across an interesting article the other day.  It was on a new set of cell phone ringtones that […]

12 Jun
2006

I always try to promote free programs if I can.  When I have a need, I usually check online for […]

10 Jun
2006

A while back I did a review on Microsoft Windows Vista.  I am now running into an issue.  I do […]

10 Jun
2006

I posted a while back about possible improvements to the Gmail system.  Here are some additions to that post. Nested […]

10 Jun
2006

Thanks to Ian and a new laptop, I am now running a copy of Microsoft Windows Vista so I figured […]

07 Jun
2006

I put SQL Server on a Windows Server 2003 virtual machine on my new 64-bit laptop but Enterprise Manager would […]

04 Jun
2006

I bought a new laptop today.  It is a Compaq v2000z.  Here are the specs. AMD Turion 64 ML-28 (1.6GHz) […]

01 Jun
2006

I haven’t blogged in a while because I was busy upgrading my MCSE and MCSA certifications. I took the tests […]

20 May
2006

Bruce Schneier has created a block cypher cryptanalysis study guide that you can download for free from his web site. […]

17 May
2006

I am back on eBay for a while to exchange my junk for someone else’s. I am selling my Mac G4 Cube, […]

15 May
2006

Skype now allows you to make calls from your PC to phones located in the US and Canada for free. […]

14 May
2006

In recent months I have submitted a variety of suggestions for improvement to the Gmail system. I figured I would […]

13 May
2006

Rootkits, if you are not familiar with them, are programs that, when on a machine, place themselves in between the […]

10 May
2006

Much of the SPAM I get uses misspelled words. This is probably so that the messages can pass through Bayesian […]

09 May
2006

Physics in games has grown rapidly over the last few years. Characters are interacting with their virtual environments in many […]

09 May
2006

Apple’s recent ads talk about how there are no viruses written for Mac. That statement is not entirely true. Viruses […]

06 May
2006

MC Plus+ has created a rap about cryptography.  It mentions encryption algorithms such as DES, AES, Blowfish, RSA, SHA-1, and […]

02 May
2006

It is not out. Dlink and Netgear have some 802.11n wireless devices out. Wireless-N devices are capable of higher transmission […]

28 Apr
2006

Alan Ralsky, the “SPAM King” and one of the largest spammers in the world, was jailed by the Department of […]

26 Apr
2006

Apple recently patented a display that includes thousands of tiny image sensors that will allow the screen to act as […]

20 Apr
2006

Seagate just announced the release of their 750 GB hard drive.  They also state that I should see 1 TB […]

13 Apr
2006

The battery on my digital camera does not last all that long.  I really like the camera. I bought it […]

10 Apr
2006

I got the latest Intel update for Mac OSX. It was about 150MB, but now I can see my NTFS […]

SQL Server 2000
09 Apr
2006

I am always trying to learn something. I really enjoyed learning about programming yesterday and now I want to shift […]

Diary
08 Apr
2006

Ian and I left for Code Camp in Pittsburgh early this morning. We were on the road by 5:30 AM. […]

Lionhead Studios
08 Apr
2006

This is a quote from Penny-Arcade about Microsoft’s recent acquisition. “I would sooner acquire crabs, but Microsoft has decided to […]

Boot Camp
08 Apr
2006

If you read the Wall Street Journal, you will know that on Wednesday, Apple released software called Boot Camp that […]

Apple Mac Mini
30 Mar
2006

I bought an Apple Mac Mini a few weeks ago. I have had my eyes on one for quite some time. […]

30 Mar
2006

Last week I picked up an Adesso Handwriting. It is a tablet for my Mac.  I did not have the […]

28 Mar
2006

A while back I received a few old servers to use in my classroom.  The oldest one was a Pentium […]

Microsoft Office 12 Beta
07 Mar
2006

I was given a copy of Microsoft Office 12 Beta to try the other day. I plan to compare it to […]

Open Office 2.0
05 Mar
2006

It has been a while since I last tried Open Office. I have used it in the past on both […]

27 Feb
2006

Digital Rights Management (DRM) is a set of technologies designed to restrict the use of digital files and media to […]

Computer Crime
27 Feb
2006

Today I presented on computer crime to my entire Associate Degree program.  I think I did a better job of […]

SQL Server
24 Feb
2006

Richard Hale and I took my classes on a field trip to the Microsoft offices here in Cleveland for a […]

Microsoft .net
20 Feb
2006

I signed up for Southwest PA Code Camp on Saturday, April 8, 2006. I have taught a programming class but […]

Blog
11 Feb
2006

I am happy about the new features added to MSN Spaces, but I am unhappy that I had to reset […]

Hard Drive
08 Feb
2006

We got some new equipment for the classroom.  I am missing hard drives on the parts because they were taken […]

Internet Explorer
07 Feb
2006

I installed the Beta 2 of Internet Explorer 7 yesterday. It is buggy as one might expect from a beta. […]

Netiquette
05 Feb
2006

The Internet has its own set of norms and acceptable behaviors.  We know these collectively as netiquette.  Please take a […]

10 Jan
2006

I found this on thenetworkadministrator.com.   Q: My Etch-A-Sketch has funny little lines all over the screen. A: Pick it […]

RFID
04 Jan
2006

I am busy writing things lately. I am working on a professional statement and on writing an article on emerging […]

25 Dec
2005

I was admiring the new switch with my brother and I thought about the 802.11g router that is sitting on […]

Wifi Rabbit
24 Dec
2005

I was made aware of this little creature on the CWNP forums and it seems quite cool.  The Nabaztagtag WiFi […]

14 Dec
2005

I am really cutting this close.  The CWSP test changes on January 1 and I just scheduled the test for […]

11 Dec
2005

For cybersecurity teams to achieve their goal of securing information and systems, they must motivate their staff.  Motivation is what […]

10 Dec
2005

Professor Hale was out last week so I was teaching his class in addition to my own.  I actually enjoy […]

Pen Testing
20 Oct
2005

Kent State University is hosting me today to talk about penetration testing and what it can do for your company […]

CWNA
04 Oct
2005

I am studying to take the CWNA (Certified Wireless Network Administrator) exam.  I plan on taking it in 3 weeks […]

06 Sep
2005

I plan to take the next Cisco test soon.  It will be nice to have the Cisco preparation over and […]

05 Sep
2005

The problem of motivating employees to do the right thing in security is an increasingly hard one.  Many companies have […]

Apple Cinema 23
21 Aug
2005

As some of you know, I bought an Apple Cinema HD 23″ widescreen display about 6 months ago.  I still […]

14 Aug
2005

I was named Instructor of the Month for August.  I am very happy for that.  It has been a great […]

22 Apr
2005

A new quarter is starting on Monday.  I will be teaching Programming 1, Career Development and Packaged Applications.  I was […]

Teaching Technology
13 Mar
2005

On Friday I went to an event in Columbus called Teaching Technology in 2005.  I learned a few things that […]

Networking
18 Feb
2005

This week I am teaching on protocols in my networking class. I love the topic and I got excited when […]

22 Jan
2005

Driving forces are the elements in an industry that cause major changes in an industry’s structure and competitive environment.  Driving […]

Remington College
04 Jan
2005

I interviewed for a position as the Computer Networking Technology professor at Remington College on Monday. After the interview, I […]

20 Dec
2004

The International market for personal and mobile robots is about $5 billion and could grow to $5.4 billion this year.  […]

27 Nov
2004

According to the Japanese patent office, the number of applications worldwide for robot technologies between 1990 and 1999 by Japanese […]

Technology Management in Japan Robotics
18 Nov
2004

I gave a presentation on robotics today and it went very well. The presentation was supposed to be 45 minutes […]

Computer Hardware
15 Nov
2004

A few years ago Dell started selling only machines with Intel processors. I have been a fan of AMD processors […]

Patch Management
14 Nov
2004

Late in the summer, Microsoft released the second service pack for Windows XP. This service pack primarily included security fixes. […]

13 Nov
2004

I visited the Matsushita (Panasonic) technology center in Osaka today with some friends.  At Matsushita, I got to see a […]

Video Games
06 Nov
2004

Ian, Chris, and I have all been waiting for a game called Dungeon Siege 2 to be released. The game […]

Google Privacy
12 Oct
2004

I was using Gmail the other day and I noticed that the ads kicked in. I did not have ads […]

12 Oct
2004

Robot pets are the latest thing in Japan.  Take, for example, the Robosapien.  This robot is making the average person […]

Sony Minidisc
07 Oct
2004

I see that Apple iPods are getting popular in Japan. It makes me wonder if iPods will eventually supplant the […]

07 Oct
2004

This is the new Apple iMac. Everything is built into the monitor. It has a slot-loading DVD burner, a large […]

Apple ibook
06 Oct
2004

It is really interesting to see how many people have Apple computers here. Apple Macintosh computers are really popular among the […]

PCI Express
10 Sep
2004

I am not going to buy a computer anytime soon but I still get excited about new things in the […]

RSS
31 Aug
2004

For those of you using RSS aggregators, Smartbar XP, News Gator, and select browsers that support it, here is the […]

22 Jul
2004

There are quite a few robotics companies or well-established companies that are heavily involved with robotics in Japan.  I would […]

Japan
24 May
2004

I talked to Kobata and he was able to get the NTT (Nihon Telephone and Telegraph) installers to come a […]

Internet
23 May
2004

NTT will set up my Internet tomorrow at 2:00. I wish they could set it up today. It is going […]

Broadband
21 May
2004

Last night I tried the various wireless networks around my area but I could not get a decent connection all […]

Keitai
08 May
2004

Did I ever mention how expensive cell phones are here, or Keitai as the Japanese call them? I had this […]

Japan Broadband
07 May
2004

I went to the Internet connection meeting last night. It was a long meeting. Here is what is going to […]

16 Apr
2004

Four crucial generic strategic options for competing in foreign markets include export strategies, licensing strategies, franchising strategies, and strategic alliances.  […]

27 Mar
2004

Porter’s five-forces model of competition is useful for determining the nature and intensity of an industry’s competition.  Competitive pressures exist […]

17 Mar
2004

Takayasu Sakurai, a professor at the University of Tokyo’s Institute of Industrial Science and his team has developed artificial skin […]

09 Mar
2004

Companies need to think strategically in order to survive and thrive in this highly-competitive world.  There are five essential tasks […]

22 Feb
2004

The SWOT (Strengths, Weaknesses, Opportunities, & Threats) analysis gives managers information on whether the company is strong or weak.  As […]

Copyright Protection
11 Dec
2003

Copyrights exist to protect creative works. This protection is given so that authors of these works can continue to create […]

FTP
29 Aug
2003

File Transfer Protocol (FTP) is an easy way to share files.  For those of you with Windows 2000 or Windows […]

24 Apr
2003

The Internet changes everything it touches and touches almost everything.  Worldwide e-commerce revenues are expected to reach $2.7 trillion.  $721 […]

25 Feb
2003

Dave Roger created the Electronic Commerce Network (ECN.W) 18 months ago to solve the problem of internet transaction processing.  Due […]

08 Feb
2003

These four tools can help managers better do their job.  In this blog, I want to briefly cover strategic group […]

20 Jul
2002

Definition of RAM A computer is made up of many components.  One of these components is RAM which is short […]

16 Jun
2002

How to convert Binary to Decimal 128 64 32 16 8 4 2 1 Total Value 1 1 1 1 […]

22 Nov
2001

Desktop processor heavyweights, Intel and AMD are fighting battles across the laptop, desktop, and server markets.  The desktop and server […]

04 Nov
2001

A Virtual Operating System (VOS) is a multiprocessing operating system designed for critical online computing. VOS combines power, flexibility, and […]

20 Oct
2001

DHCP is a networking protocol that provides safe, reliable, and simple TCP/IP network configuration and offers the dynamic configuration of […]

17 Jul
2001

An editorial in eWeek covered the congressional hearings regarding a new tool developed by the FBI called the “Carnivore surveillance […]

18 Apr
2001

Information security seems like more of a human problem than a technological one.  Certainly, we spend a lot of time […]

20 Mar
2001

As we have learned in our text, Recruiting is one of the activities of the human resource department and is […]

08 Mar
2001

I was out for a birthday lunch today and a friend asked what a pixel is. After fumbling around for […]

16 Sep
2000

Steve Jobs has been instrumental in the evolution of the computer as we know it today.  Steve Jobs co-founded Apple […]

05 Jan
2000

In considering art, you only know what you like according to what you know. The history of art is also […]

11 Nov
1999

Microsoft Windows NT was first released in 1993.  NT stands for New Technology.  Windows NT was Microsoft’s platform of choice […]

22 Oct
1999

The hum of my gray computer is a wonderful sound. Always working; always running. When the morning light streams through […]

04 Oct
1999

What used to be just an audio compression format has become the heart of an enormous controversy. The Mp3 format […]

09 Sep
1999

Heroes, legends, bizarre contraptions, and fantastic adventures await me within the pages of the books shelved on my dresser.  These […]

20 Jan
1998

Sophocles, a Greek poet in the fifth century B.C., told the tale of a woman named Antigone who disobeyed the […]

14 Jun
2018

As we look to the future, our reliance on data is only going to increase. Technologies such as IoT, AI, robotics, […]

11 Jun
2018

Logs are crucial elements to breach investigations.  However, some investigations suffer from a lack of logs.  In such cases, the company […]

29 May
2018

The modern company thrives on data, yet some are also drowning in it.  The data that we find so precious […]

21 May
2018

I recently presented at the Duke Law EDRM on Cybersecurity and Law Firm Understanding Legal and Ethical Obligations.  Some questions […]

04 May
2018

Data, a crucial asset for the modern business, is under attack.  Data breaches, ransomware, employee theft, and mistakes can each […]

18 Apr
2018

Data is the building block of the modern business. It is essential for daily operations and ongoing commercial operations, but more […]

19 Mar
2018

The General Data Protection Regulation (GDPR) is set to go into effect on May 25, 2018, and yet many companies […]

15 Mar
2018

The zombie apocalypse is frequently mentioned in literature and pop culture.  Some have even taken steps to protect against this […]

08 Mar
2018

The need for patch management has repeatedly been demonstrated in recent years as companies large and small suffered data breaches […]

21 Feb
2018

It is healthy to take a step back from the technological changes of today to strategize on how the technology […]

12 Feb
2018

Cyber attacks on hospitals and other healthcare institutions have increased over the last 18 months, in part because they make […]

09 Feb
2018

There’s no doubt that cybercriminals are busy preparing more ransomware attacks for the remainder of 2018. And that ransomware code […]

05 Feb
2018

Companies experienced a deluge of cyberattacks in 2017 and the first part of 2018 has proven no different.  In 2016, […]

02 Feb
2018

In a world where many are battling corruption, Hasbro is doing the opposite.  The classic Monopoly game where players attempt […]

18 Jan
2018

Our companies and data are under an increasing assault from ransomware.  Its scale and scope have only grown as profits […]

08 Jan
2018

2017 was called the year of ransomware, but ransomware is showing no signs of slowing down.  Ransomware is expected to […]

25 Nov
2017

While blockchain has earned its most significant claim to fame by making possible the rise of cryptocurrencies like bitcoin, researchers […]

24 Nov
2017

Katie Niemi and Eric Vanderburg While being diligent with your online shopping is important and necessary, there are a few […]

16 Nov
2017

Many view the cybercriminal as an unknown.  This is due, in part, to the difficulty inherent in tracking down individual […]

15 Nov
2017

There are two ways to think about the European General Data Protection Regulation (GDPR), set to go into effect in […]

10 Nov
2017

This technological era is one that changes rapidly and so do defense strategies.  In the ancient world, combat strategies might […]

06 Nov
2017

The General Data Protection Regulation (GDPR) is set to go into effect on May 25, 2018, and yet many companies […]

03 Nov
2017

As the size of the Internet of Things (IoT) continues to grow, so too do the potential security risks for […]

02 Nov
2017

In recent years, there has been a fundamental change in both the scope and scale of cyber threats to critical […]

17 Oct
2017

The wildfire that ripped through California in early October caused tremendous damage and the loss of over 30 lives.  So […]

03 Oct
2017

Cybercriminals use phishing emails with malicious links or attachments to distribute ransomware more than any other method. Their goal is […]

29 Sep
2017

The WannaCry ransomware attack earlier this year infected more than 230,000 computers in 150 countries within one day of its release. It received […]

27 Sep
2017

Defense Federal Acquisition Regulation Supplement (DFARS) clause 225.204-7012 was established in 2015 to protect Controlled Unclassified Information (CUI).  CUI is […]

28 Aug
2017

Ransomware, the malicious code that holds data hostage, is now a more common threat to businesses than data breaches. It […]

24 Aug
2017

The costs associated with a ransomware attack are often viewed from two dimensions: On one side, there is the ransom […]

14 Aug
2017

Some ransomware are strategically designed to cause as much damage as possible while producing large profits for cybercriminals. And the […]

Linux Ransomware
10 Aug
2017

Linux is an open-source operating system that is very versatile due to the large group of volunteers that maintain and […]

08 Aug
2017

Cybersecurity challenges companies, countries, and individuals to continually improve protections against an enemy that wants our secrets, money, and identify.  […]

Privacy is not dead
31 Jul
2017

An acquaintance from a younger generation said to me one day, “Don’t you know that privacy is dead?” I was […]

24 Jul
2017

Most people will never have a fire in their home or office, but everyone can remember going through a fire […]

17 Jul
2017

The process of making sure your business is prepared to protect its data from ransomware and other disasters depends largely on the […]

12 Jul
2017

Virtual reality has received a lot of attention lately, but there is much to be said for Augmented Reality (AR) […]

26 Jun
2017

A new ransomware do-it-yourself kit called Karmen is making it easy for wannabe cybercriminals to launch ransomware attacks. Security researchers […]

19 Jun
2017

With the upcoming onset of the GDPR, many companies are seeking to leverage their cloud services for GDPR compliance. Companies […]

12 Jun
2017

The General Data Protection Regulation (GDPR) is the latest in a host of rules designed to protect privacy.  It is […]

07 Jun
2017

Apple Inc. has a reputation for building secure devices, but don’t become too complacent because ransomware threats to Mac users […]

19 May
2017

Pavan Belagatti and Eric Vanderburg Early DevOps adopters have proven DevOps to be more than just a cultural shift or […]

01 May
2017

For decades, the printer has been the intermediary between the digital and physical worlds.  Through it, our creations become tangible […]

24 Apr
2017

There are a variety of different ransomware variants that encrypt your data with no intention of ever decrypting it. There […]

18 Apr
2017

When it comes to ransomware attacks, those who lose valuable data and have no viable backup tend to pay the […]

17 Apr
2017

The repeal of the FCC Internet privacy rules has spurred on many discussions on privacy online and how companies collect […]

13 Apr
2017

I recently did an interview with Karen Marcus for Careers in Cybersecurity on education, career development, and cybersecurity career success.  […]

07 Apr
2017

Spora is a relatively new ransomware, but there are signs which indicate that it could become a major player in […]

06 Apr
2017

Bring your own device (BYOD) policies are commonplace in many organizations today. Employees bring in their personal cell phones, laptops, […]

03 Apr
2017

Ransomware is infecting the computers of unsuspecting victims at an astronomical rate. The various methods that cybercriminals use to take […]

17 Mar
2017

The insider is still one of the most vulnerable elements of cybersecurity.  Insiders are those who are authorized to work […]

15 Mar
2017

I recently did an interview with JAX Magazine on DevOps and here is the transcript of the interview. Some people […]

01 Mar
2017

Cybercriminals extorted about one billion dollars from ransomware victims last year, according to the FBI. And nearly all of those […]

18 Feb
2017

If we have learned anything over the last few years about data breaches, it is that they are likely to […]

23 Jan
2017

People charged with filling career positions at their companies need to be on the lookout for ransomware, especially GoldenEye ransomware. […]

13 Jan
2017

PopcornTime is a newly-discovered form or ransomware that is still in the development stages but operates off a disturbing principle: […]

16 Dec
2016

Two email accounts of a ransomware distributor were recently compromised. The analysis of these accounts gives an interesting “behind the […]

09 Dec
2016

Cybercrime is very much a psychological game and ransomware is no exception. Psychology plays a major role in almost all […]

08 Dec
2016

This past year, ransomware has extorted vast sums of money from enterprises.  Ransomware is a form of malware that encrypts […]

05 Dec
2016

Machine learning is a science that uses existing data on a subject to train a computer how to identify related […]

01 Dec
2016

Ransomware continues to be a huge problem for companies and consumers—and a major source of income for cybercriminals. Malicious hackers […]

25 Nov
2016

In the world of technology, paradigms shift quickly.  Not long ago, we focused organizational security efforts on the perimeter of […]

23 Nov
2016

The latest version of Cerber ransomware is targeting database applications and putting business’s most valuable data at risk, according to […]

22 Nov
2016

Security software companies and research organizations are collaborating to break the encryption codes of ransomware variants and free those who […]

08 Nov
2016

Ransomware computer viruses are becoming more sophisticated—and so are the attacks that make use of ransomware. In some cases, ransomware […]

07 Oct
2016

Ransomware infections are becoming increasingly commonplace, and companies that put a plan together before an incident are much more effective […]

06 Oct
2016

As if encrypting your individual files was not enough, a recently discovered ransomware called Mamba encrypts your entire hard drive. […]

21 Sep
2016

The news is crowded with reports from noteworthy companies of cyber-attacks.  Last year was the year of the data breach […]

07 Sep
2016

People are the core of any incident response effort.  You must have the right people to provide the right response.  […]

02 Sep
2016

We all know money is the motivating force behind cybercrimes like the creation and distribution of ransomware. The interesting twist […]

30 Aug
2016

A Pokemon Go themed ransomware virus has appeared on Windows computers, tablets, and phones. The ransomware is the latest in […]

25 Aug
2016

The average company today is a hybrid collection of traditional on-premise and cloud-based IT solutions.  On-premise solutions may include identity […]

17 Aug
2016

Ransomware creators are monetizing their software in creative new ways. Not only are they using ransomware to encrypt files and […]

10 Aug
2016

The US presidential election is upon us and some political activists are out in the streets, and in convention halls. […]

25 Jul
2016

Criminals are raising the bar in the fight for your money.  It’s natural to expect that competition would follow success—and […]

19 Jul
2016

It might surprise you to know that ransomware uses geolocation technology to customize payloads and target individuals. You probably already […]

13 Jul
2016

Ransomware is the quickest way to turn your valuable data into garbage.  Ransomware is a form of malicious software that […]

01 Jun
2016

Businesses today can’t exist without data. They feed on it, breathe it, and those that understand how to most effectively […]

10 May
2016

Storage solutions make or break the systems they support and yet these same systems are routinely seen as a cost […]

22 Mar
2016

The concept of identity is core to the protection of data.  Data and other computing resources exist to be used […]

12 Feb
2016

Ransomware is an evolving malware threat.  Where once malware was predominantly an inconvenience, ransomware takes aim at data, the lifeblood of […]

06 Jan
2016

We may not be using more of our brains but we can probably use more of our data. Did you […]

22 Dec
2015

2016 is going to be a big year for security. News of data breaches and the major technological innovations of […]

12 Dec
2015

Spoiler alert for all my regular cybersecurity readers: this is a post about audio, not security.  Check back in a […]

04 Dec
2015

You probably remember Microsoft’s announcement for their augmented reality or mixed reality hardware called HoloLens which occurred around the announcement […]

24 Nov
2015

This is the start of the season. No, I am not talking about the Christmas season or the shopping season. […]

24 Nov
2015

CDW asked me what my must-have products were for #Techsgiving sweeps and I have to say the choice was rather […]

19 Nov
2015

This statement may be familiar to many who have considered cloud services and it was both the start and end […]

10 Nov
2015

The maturation of the cloud is fascinating as it continues to adapt, providing more opportunities for companies and consumers to […]

09 Nov
2015

I used to be agitated by the sound of the phone. My wife and I both have cell phones but […]

04 Nov
2015

Shortcuts, as the name implies, are key combinations that you can press on your keyboard to perform semi-complex actions.  These […]

29 Oct
2015

Security is a growing field, and with its growth come many different career options. As you gain experience in different […]

27 Oct
2015

I was recently asked the question, Can eDiscovery systems prove the integrity of the email that they discover? If so, […]

20 Oct
2015

Information security is often described using the CIA Triad. The CIA stands for Confidentiality, Integrity, and Availability and these are […]

15 Oct
2015

Do you know why all the major online retailers offer a way for users to review products? It’s because people […]

22 Sep
2015

Anonymity has been a longstanding hallmark of the Internet but you should no longer assume that your online activities are […]

08 Sep
2015

New graduates are in a tough spot, especially those interested in cybersecurity. A majority of cybersecurity positions require one or […]

31 Aug
2015

The Internet community grows larger everyday as more and more devices are attached to it. These devices increasingly include not […]

14 Aug
2015

Microsoft officially launched its successor to Windows 8.1, Windows 10, on July 29, 2015, and millions have already downloaded this […]

15 Jul
2015

In 2014, the Identity Theft Resource Center (ITRC) tracked 783 data breaches with 85,611,528 confirmed records exposed. This year appears even more […]

22 Jun
2015

Some breaches require notification such as those involving patient data or customer information, but sharing is optional. Of course, notification […]

15 Jun
2015

We are getting closer and closer to virtual reality.  Some companies such as Google and Oculus have already produced virtual […]

13 Jun
2015

A relatively new term has entered into our vocabulary; Internet of Things (IoT).  IoT refers to any device that is […]

11 Jun
2015

I was talking to Mark Schaefer and he said that SEO content today is about insight rather than quality.  This […]

18 May
2015

New and creative security threats may grab headlines, but smart security practitioners know that many attackers still rely on the […]

11 May
2015

Last week I was walking down the street with a friend and a guy and a girl yelled over to […]

07 May
2015

In 5 to 10 years, the cloud will be as ubiquitous as the Internet is today. It is predicted that […]

03 Apr
2015

With the ease and prevalence of global expansion, security leaders must understand how to implement security across a global organization […]

13 Mar
2015

Successful security leaders demonstrate their effectiveness through metrics. Metrics are used more and more as security executives emulate the way […]

24 Feb
2015

As vigorously as many organizations are working to prevent them, data breaches are becoming more of a common occurrence, and the consequences […]

18 Feb
2015

In childhood I dreamed of a world quite grand Where my name and face were far from mystery A life […]

09 Feb
2015

It is easy to get down or even depressed with the focus on negatives in the news and in conversation.  […]

03 Feb
2015

Security spending could be compared to the stock market. It increases and decreases depending on intangibles such as how “at-risk” […]

14 Jan
2015

I always figured that you would need to know what you have in order to protect it. However, I have […]

06 Jan
2015

We’ve seen quite a variety of online threats recently. A simple email containing a convincing subject line can compromise a […]

23 Dec
2014

The cloud has received a lot of negative press from security professionals and, I have to admit, we’ve come off […]

09 Dec
2014

It seems like security practitioners are still saying the same things they said ten years ago. Use complex passwords. Change […]

04 Dec
2014

Do you conduct debriefing sessions after completing a cybersecurity project? Quite often, our minds are moving on to the next […]

02 Dec
2014

As an organization becomes more conscious and engaged in protecting information, it progresses along a path of security maturity. I […]

26 Nov
2014

Join the Cleveland Metropolitan Bar Association Business, Banking & Corporate Counsel Section on Thursday, December 11, 2014, for a panel […]

25 Nov
2014

As hard as it is to believe, 2014 is almost at a close. While some think about Holiday gatherings and […]

08 Nov
2014

I welcome you to join me on November 8 at Grace Baptist Church of Westlake for the Untangled Conference.  I […]

31 Oct
2014

An estimated 5% of annual corporate revenues are lost each year to fraud, represented in part by computer fraud. Protection […]

23 Oct
2014

I was asked a question on Twitter today. The question was, “Is staying safe online possible?” This is a great […]

14 Sep
2014

The Value of Big Data Accenture released the findings of their big data study on September 10, 2014, and it […]

07 Aug
2014

The largest internet security breach in history has just been discovered. Hold Security, a small cybersecurity firm, first reported the […]

16 Jul
2014

I was recently listed as the number 10 information security leader to follow on Twitter in Information Security Buzz’s 25 […]

14 Jul
2014

Security breaches and identity theft are becoming an increasing concern for consumers as hackers continue to target large retailers. Target, […]

19 Jun
2014

A botnet or zombie army is a group of computers – with their owners unaware of it – that is […]

28 May
2014

The power supply and control panel for this Dell PowerVault 124T tape autoloader failed with a tape in the drive.  […]

21 Apr
2014

I want to thank Amber Newby for listing me as the number 11 person on Twitter aiding against identity theft.  […]

18 Jan
2014

I was recently the keynote speaker and the IT professional development event hosted by Cuyahoga Community College and the Helpdesk […]

13 Dec
2013

Twas the night before the breach, when all through the place Not an alarm was ringing, nor even a trace […]

03 Nov
2013

I appeared on the Sound of Ideas program on National Public Radio channel 90.3, WCPN on November 3.  In the […]

15 Aug
2013

I was talking with a client about multifactor authentication and they wanted a demo of what that looked like so […]

27 Jul
2013

I was honored to be able to address the final graduating class at Remington College’s campus on the West side […]

16 Jul
2013

Vanderburg was recently listed as the number 10 information security leader to follow on Twitter in Information Security Buzz’s 25 […]

27 Jun
2013

Security remains a complex discipline.  This ever-changing challenge grows in complexity daily as new threats emerge and compliance requirements increase.  […]

23 May
2013

I watched the XBOX One launch video today on my XBOX 360 console dashboard.  It is impressive in some ways […]

22 May
2013

Social networking is my thing this year and I just wanted to share my strategy with you in case you […]

15 May
2013

There are so many ways to share on social media today and users, especially the younger generation, are sharing almost […]

10 May
2013

On May 9, 2013, Federal prosecutors issued indictments against eight individuals for hacking and theft.  The case revealed the methods […]

02 May
2013

The Electronic Frontier Foundation issued a report on 18 web and technology companies that routinely handle data.  The study looked […]

24 Apr
2013

The Florida Department of Juvenile Justice (DJJ) had a mobile device containing 100,000 youth and employee records stolen on January […]

03 Apr
2013

Salem State University in Massachusetts issued a data breach warning to faculty and students on March 11.  The warning informed […]

20 Mar
2013

I will be presenting at the ISACA CPE & Social Event – Cyber Forensics & Cleveland Cavaliers vs. Miami Heat […]

13 Mar
2013

On March 8, 2013, a contractor working for North Carolina’s Department of Health and Human Services (HHS) billing department stored […]

07 Mar
2013

A recent study by Deloitte, titled Blurring the lines: 2013 TMT global security study, shows that 59% of Technology, Media, […]

28 Feb
2013

Some have emailed me asking why criminals would even care about Personal Health Information (PHI).  Sure, it’s private information but what […]

20 Feb
2013

The EU Information Commissioner’s Office (ICO) has stated with its recent fine for Sony of £250,000 that lack of knowledge […]

14 Feb
2013

President Obama signed an executive order on February 12, 2013, that requires federal agencies to share information on cyber threats […]

05 Feb
2013

Two weeks ago hackers took control of 14 servers and 20 workstations at the U.S. Department of Energy (DOE), obtaining […]

30 Jan
2013

The Department of Health and Human Services (HHS) released the HIPAA Omnibus rule on January 17, 2013, designed to give […]

24 Jan
2013

I had an awesome time with you all. Thanks for making it a great LAN party.  Here are a few […]

23 Jan
2013

Back in November, I blogged about the hack back initiative here in the United States.  Well, similar debates are taking […]

20 Jan
2013

Are you ready for some great PC gaming? Bring your computer to VandyLAN 8 where we will game all day […]

17 Jan
2013

On January 2, 2013, the Department of Health and Human Services (HHS) fined the Hospice of North Idaho $50,000 for […]

09 Jan
2013

Security researchers have identified a new malware called Dexter that specifically targets Point of Sale (POS) systems such as cash […]

03 Jan
2013

It is easy for miscommunication to happen after a data breach.  There could be many people working on the incident […]

21 Dec
2012

Here is a fact that many of us would like to forget.  Most data theft occurs by insiders.  This is […]

19 Dec
2012

Recent research shows that hospitals are the highest risk for data breaches.  The third annual benchmark study on patient privacy […]

14 Dec
2012

Our Security Operations center keeps track of a lot of information.  Here are two workspaces in the SOC.  Let me […]

12 Dec
2012

A recent finding by Gartner titled “Using SIEM for Targeted Attack Detection” is that 85% of breaches go undetected.  Those […]

05 Dec
2012

Government regulation, including the well-known HIPAA and GLBA, are quite clear on the notification requirements for businesses suffering a data […]

29 Nov
2012

Like paparazzi on celebrities, hackers pound on our organizational doors almost every second of the day.  It makes us want […]

14 Nov
2012

Data breaches are occurring more frequently and companies are searching for a way to help prevent the breach by understanding […]

07 Nov
2012

On October 10, the Secret Service’s electronic crimes task force discovered that the South Carolina Department of Revenue’s systems were […]

02 Nov
2012

An organization’s security culture in relation to information security determines how receptive employees will be to security initiatives.  Culture can […]

24 Oct
2012

At the upcoming Information Security Summit, I will be presenting on the topic, “Eradicate the Bots in the Belfry.”  Bots […]

18 Oct
2012

A recent survey of small business owners showed that while 77 percent believe that security is important for their company’s […]

08 Oct
2012

Last month, Senator John D. Rockefeller IV, Chairman of the U.S. Senate Committee on Commerce, Science and Transportation, sent the […]

03 Oct
2012

Did you know that computers often become infected with virus-like programs called “bots” causing “denial of service” incidents on websites? […]

26 Sep
2012

Many people have asked me how to reset their Windows password so I decided to write this blog about it.  […]

19 Sep
2012

Every once in a while, a website will try to convince you to change your security settings.  I was looking […]

18 Aug
2012

A few months ago I discussed the sale of zero-day exploits. The Zero-day exploit trade is a new market; increasingly […]

04 Jul
2012

As we think of today, our Independence Day, consider also the information security and cyber security professionals who guard our […]

21 Jun
2012

It seems no matter where you turn; someone is waiting to rip you off.   Our inboxes drown in spam and […]

Data Classification
14 Jun
2012

Data classification is a term that is not usually associated with the small business.  It tends to invoke thoughts of […]

08 Jun
2012

While many people think that a person’s social media posts, photos, and conversations are protected as private information, especially if […]

07 Jun
2012

Social engineering is the art of manipulating people into giving up confidential information. The types of information social engineers seek varies, […]

23 May
2012

  Managing the security of an organization can be quite confusing. It can seem like an uphill battle when basic […]

03 May
2012

Public clouds have been greatly promoted as an approach for organizations to reduce information technology (IT) costs and increase technology […]

10 Apr
2012

If you had a breach of your most sensitive data tomorrow, how much would it cost you?  There are quite […]

12 Mar
2012

The phrase “Knowledge is power” has never before become so clear and scary.  The knowledge that is kept secret can […]

16 Feb
2012

Historically, ecological concerns have been significant drivers for change.  Topics ranging from global warming to protecting various species carry a […]

09 Feb
2012

For more than a decade, computer-generated digital certificates have made it possible to authenticate the identity of computer systems, data, […]

03 Feb
2012

Gerald Wilde had a theory called risk homeostasis.  This theory hypothesizes that people have a level of acceptable risk.  When […]

26 Jan
2012

The latest televisions and Blu-Ray players come equipped with more than HD video and audio.  Internet access and a host of […]

19 Jan
2012

Organizations are accumulating data at a pace that would cause a hoarder to blush.  Just like that old bicycle seat […]

07 Dec
2011

ISO 27000 is a set of security standards that organizations can implement to provide an industry-recognized minimum level of security.  […]

01 Dec
2011

The site is down!  These are haunting words for most businesses, and today’s topic: the DDoS (Distributed Denial-of-Service) attack. This […]

19 Nov
2011

If you want to create an EXE, executable file, from a batch file or VBS file, these two programs will […]

16 Nov
2011

Data breaches and security incidents are a significant risk for organizations and some are using cyber insurance to transfer the […]

27 Oct
2011

Losing data can be tremendously devastating to a company. It could compromise security, information, and jobs. Today, we will look […]

20 Oct
2011

As you laugh at my title, anticipating several paragraphs of satire, think about what I’ve just said because I’m serious…to […]

12 Oct
2011

The use of SIEM, DLP, and IAM can significantly enhance the capabilities of information security departments. SIEM allows a company to […]

06 Oct
2011

Imagine a boardroom a generation ago.  Smoke fills the air, and sidebar discussions thrive while the board members wait for […]

29 Sep
2011

Scams exist.  That is a simple truth.  There are honest people, and then there are others who try to cheat.  […]

23 Sep
2011

Previously, we have discussed the dangers of hacking and measures to take against an attack in the LulzSec blogs.  Now […]

15 Sep
2011

PCI applies to a wide range of corporations and companies that deal with credit card transactions, and it can be […]

08 Sep
2011

HIPAA is regulation intended to help covered entities and their business associates protect Electronic Protected Health Information (ePHI).  The U.S. […]

31 Aug
2011

Information security is often feared as an amorphous issue that only the IT department has to deal with. The reality […]

24 Aug
2011

“Thinner. Lighter. Faster. Facetime. ” That is the catchphrase from the Apple page dedicated to the iPad. While Apple is […]

18 Aug
2011

Thank you for staying tuned into our third case study and final installment of our four-part series on the Lulz […]

15 Aug
2011

This post is the third part of a four-part series on the LulzSec hackers. Our first entry titled “Awareness Pains: […]

03 Aug
2011

As promised, here is the first case study regarding the events surrounding the Lulzsec group. If you are reading that […]

21 Jul
2011

Bob set down the phone with a sigh. After six hours, five phone calls, countless emails, and two meetings, it […]

14 Jul
2011

Social Networking is a godsend and concern, a help and a hindrance, an amazing feat and a terrible nuisance. While […]

01 Jun
2011

We have worked hard to educate users of the need for computer hygiene, using anti-spyware, multiple browsers, data backups, and […]

10 May
2011

Corporate espionage is not just a plot for action movies; it is a real threat to small and large businesses.  […]

21 Apr
2011

The average organization has numerous types of equipment from different vendors. Along with the equipment, businesses also utilize multiple software […]

22 Feb
2011

Change management is a key information security component of maintaining high availability systems. Change management involves requesting, approving, validating, and […]

01 Feb
2011

Hackers often bypass some of the best security technologies by exploiting one of the oldest tricks in the book, your […]

25 Jan
2011

Briefcase chained to his wrist, the officer cautiously looks for anything out of the ordinary as he makes his way […]

05 Jan
2011

Do you think there is a right way to crash?  A system crash sounds like a bad thing all around, […]

29 Dec
2010

Many organizations use Cisco devices to interconnect, protect, filter, and manage networks so it is important to understand ways to […]

22 Dec
2010

Joy to the World the Lord has Come! As we approach the celebration of our Savior’s birth, our minds think […]

10 Dec
2010

An information security risk assessment is the process of identifying vulnerabilities, threats, and risks associated with organizational assets and the […]

15 Nov
2010

Information security policies and security awareness go hand in hand. Frankly, a policy is worthless if it sits on someone’s desk. […]

12 Nov
2010

Since many organizations are rapidly virtualizing servers and even desktops, there needs to be direction and guidance from top management […]

29 Oct
2010

Data Loss Prevention (DLP) is one of those terms that is often mentioned but less often defined. The term can […]

07 Oct
2010

Companies collect millions of gigabytes of information, all of which has to be stored, maintained, and secured. There is a […]

27 Sep
2010

Virtualization has really become a mainstream technology and an effective way for organizations to reduce costs. Virtualization simplifies processes but […]

10 Aug
2010

Virtualization is an excellent way to make better use of existing IT resources but utilizing them for multiple tasks.  It […]

15 Jul
2010

For those of you using Microsoft’s Data Protection Manager and Exchange Server 2007 SP1 x64, you will definitely want to […]

15 Jul
2010

The biofilters from Star Trek may some day become reality.  The Star Trek biofilter is a device that scans for […]

09 Jul
2010

Snapshots are a valuable feature virtualization offers business continuity. Organizations can create point-in-time recovery points numerous times a day by creating […]

29 Jun
2010

Aimee and I use my home theater a lot and so when my DVD player started skipping on disks I […]

16 Jun
2010

Microsoft released one of the greatest gaming controllers with the Strategic Commander back in 2001.  The controller fits perfectly in […]

07 Jun
2010

Business continuity plans are designed to define the processes necessary to protect organizational assets and to keep the business running in […]

18 May
2010

I have been struggling with some ASP AJAX code.  I moved a .NET site from Server 2003 32-bit IIS6 to […]

Pyramid Scheme
16 May
2010

There are many new threats on the Internet, but that doesn’t mean criminals don’t try the tried and true methods […]

08 May
2010

I was honored to be selected as the commencement speaker for Vatterott College’s 2010 graduation on May 8.  It was […]

12 Feb
2010

Security policies and security awareness go hand in hand.  Frankly, a policy is worthless if it sits in someone’s desk.  […]

20 Dec
2009

REJOICE! A Savior is Born! The last of the vibrant colors of fall are still clinging to the trees as […]

21 Nov
2009

Despite the name, money mules are not good.  Money mules are people who are duped into laundering money for criminal […]

Computer Forensic MAC Times
10 Oct
2009

I was explaining some computer forensics topics to a customer the other day and I was asked what MAC times […]

20 Jul
2009

I wanted to remind you that this Saturday, July 25 from 12:00 Noon till 12:00 Midnight is VandyLAN 7.  I […]

19 May
2009

Do you want to hear something funny? I have been writing a lot lately and the words were just flowing […]

15 May
2009

I have been working on a fantasy novel for the past few weeks.  I haven’t exactly followed good writing principles […]

13 Mar
2009

I will be joining Pei-Ying Lin at Cleveland State University today to present on Virtualization for Competitive Advantage.  Virtualization can […]

29 Jan
2009

The Patriot Act allows the government to classify unruly activity by passengers on airlines as acts of terrorism. Some individuals […]

17 Dec
2008

Merry Christmas and Happy New Year. It is hard to believe that a new year is on the horizon once […]

15 Sep
2008

I read an article by Bruce Schneier called Security ROI in CSO magazine. Here is an excerpt from it: “Assume […]

28 Aug
2008

Have you ever completely forgotten how to do something until you just started? As a cybersecurity professional, I find that […]

22 Aug
2008

So I was working on a problem at work today.  We can only copy 4000 files at a time and […]

19 Aug
2008

In a 2008 blog entry by Steve Clayton at Microsoft, he mentions the five things he looks for in candidates when […]

19 Jun
2008

At the incident response workshop I ran, we talked through a data breach caused when private data on an FTP […]

17 Apr
2008

Full-text searching allows more complex searches such as word or phrase searching, inflection matching, proximity searching, and relevance matching to […]

12 Mar
2008

Phishing schemes abound, but many use some form of the irresistible offer.  In this type of phishing, this dream of […]

02 Feb
2008

It has been a while since I posted anything about the arcade machine and for good reason.  It has been […]

17 Dec
2007

Last month my fish tank sprung a leak. I have a 775-gallon bow-front aquarium so it made quite a mess. […]

15 Jun
2007

Phishing has finally gotten more interesting.  I am tired of the Nigerian phishing schemes that continually enter into my mailbox.  […]

07 Jun
2007

I haven’t used a webcam for years but I have never been on to follow the trends. It might seem […]

20 Apr
2007

There are quite a few upcoming things on the agenda. My article”Implementation to Instruction – Is teaching next in your […]

22 Feb
2007

Even Macs age and eventually need to be replaced.  If you are planning on giving your Mac away, it is […]

20 Oct
2006

I am always on the lookout for new programs that can solve my problems for free.  My copy of Nero […]

06 Oct
2006

I wanted to comment on an odd form of communication.  I looked at the writing inside the bathroom stall today […]

16 Sep
2006

Should cybersecurity be a global strategy?  This is an interesting question because cultures, environments, and regulatory environments differ around the world, […]

14 Sep
2006

I have not posted in a while because things have been so busy.  I think I will change the direction […]

08 Sep
2006

My Brother and Friend Eulogy for Justin Vanderburg by Eric Vanderburg September 6, 2006 I could ask for no better […]

21 Aug
2006

Cybersecurity benchmarking is an excellent way to make improvements in cybersecurity practices.  Benchmarking is an activity that compares a business’s […]

17 Aug
2006

Today is my last day teaching at Remington College.  I was asked not to tell the students until today.  It […]

22 Jul
2006

This is the list I am starting of good Firefox extensions.  Each of these is one I would highly recommend. 1. […]

05 Jul
2006

As you likely know, China filters Internet traffic coming into their country.  There is some content that they do not […]

29 Jun
2006

I am happy to announce that I passed another certification test – actually two of them.  I took the MCDBA […]

26 Jun
2006

I looked at my Google search history today.  Google tracks each search that you make when logged in with your […]

26 Jun
2006

Tech Blog has compiled a list of the top 10 strangest Japanese gadgets and accessories. Check it out. It is […]

26 Jun
2006

Ian gave me the latest Beta of Windows Vista. I have the 64-bit edition and I hope it will work […]

19 Jun
2006

Ian got me the four Microsoft guys from the Source Force. I gave a few of them different names when […]

18 Jun
2006

I found the issue with Aero Glass that I reported earlier. The reason why Aero Glass fails sometimes is that […]

18 Jun
2006

I used to recommend Auditor for security testing through Linux.  Auditor was similar to Knoppix, the bootable “live” version of […]

16 Jun
2006

When I first tried Vista last week I wondered why MSN Messenger was not bundled with the operating system.  I […]

13 Jun
2006

I came across an interesting article the other day.  It was on a new set of cell phone ringtones that […]

12 Jun
2006

I always try to promote free programs if I can.  When I have a need, I usually check online for […]

10 Jun
2006

A while back I did a review on Microsoft Windows Vista.  I am now running into an issue.  I do […]

10 Jun
2006

I posted a while back about possible improvements to the Gmail system.  Here are some additions to that post. Nested […]

10 Jun
2006

Thanks to Ian and a new laptop, I am now running a copy of Microsoft Windows Vista so I figured […]

07 Jun
2006

I put SQL Server on a Windows Server 2003 virtual machine on my new 64-bit laptop but Enterprise Manager would […]

04 Jun
2006

I bought a new laptop today.  It is a Compaq v2000z.  Here are the specs. AMD Turion 64 ML-28 (1.6GHz) […]

01 Jun
2006

I haven’t blogged in a while because I was busy upgrading my MCSE and MCSA certifications. I took the tests […]

20 May
2006

Bruce Schneier has created a block cypher cryptanalysis study guide that you can download for free from his web site. […]

17 May
2006

I am back on eBay for a while to exchange my junk for someone else’s. I am selling my Mac G4 Cube, […]

15 May
2006

Skype now allows you to make calls from your PC to phones located in the US and Canada for free. […]

14 May
2006

In recent months I have submitted a variety of suggestions for improvement to the Gmail system. I figured I would […]

13 May
2006

Rootkits, if you are not familiar with them, are programs that, when on a machine, place themselves in between the […]

10 May
2006

Much of the SPAM I get uses misspelled words. This is probably so that the messages can pass through Bayesian […]

09 May
2006

Physics in games has grown rapidly over the last few years. Characters are interacting with their virtual environments in many […]

09 May
2006

Apple’s recent ads talk about how there are no viruses written for Mac. That statement is not entirely true. Viruses […]

06 May
2006

MC Plus+ has created a rap about cryptography.  It mentions encryption algorithms such as DES, AES, Blowfish, RSA, SHA-1, and […]

02 May
2006

It is not out. Dlink and Netgear have some 802.11n wireless devices out. Wireless-N devices are capable of higher transmission […]