You can't secure what you don't acknowledge.SM

Thursday, March 11, 2010

Unexpected vulnerabilities in the cloud?

When you look past all the ridiculous hype and craze over "cloud computing" the realities set in. Here's a new piece I wrote for SearchCompliance.com that can help set you straight:

Find unexpected vulnerabilities to ensure cloud compliance

Twitter stole my Twitter idea

I was recently talking to a client about how we need to start up a company with a Twitter acquisition as our exit strategy that scans for malicious URLs in the tinyurl, bit.ly, etc. links that are posted on Twitter. Twitter beat us to the punch. It's actually pretty difficult to comprehend that it's taken them this long to fix such a big problem. Nice to see some innovation where it's really needed.

Trouble getting policy buy-in? Make 'em self-executing.

If you're having trouble getting security policies on the radar of management and users - much less getting the real buy-in you need, don't fret - there is a possible solution.

It's an idea I got from Louise Slaughter (good name for a politician) and her attempt to force Obamacare on us. Simply make your policies "self-executing". In other words, you write the policies and include verbiage in each one that makes them take effect without any buy-in, votes, or opinions whatsoever.

Imagine if it were this simple for anyone but politicians to manipulate the system in their favor. Now that would be information security change we could believe in!