May 8, 2014

9tips


When it comes to small business security, sometimes you don’t have to be the fastest; you just need to make sure you’re not the slowest.  In the animal world being second slowest may mean you’re not dinner for a herd of feasting animals.  In business, striving to be t...

February 12, 2014

We often think of security in terms of technology and compliance, either because that’s where our interest lies or because we’re mandated to do it.  It’s easy to be lulled into a sense that we’re accomplishing our objectives, or to become cynical because leadership car...

May 31, 2013

Article written by: Jonathan Lampe, a security researcher for the InfoSec Institute.

The OWASP Top 10 list publicizes the most critical web application security flaws as determined by Open Web Application Security Project (OWASP), a nonprofit, vendor-independent IT secu...

May 29, 2013

As an information security consulting firm, we’re often asked what kinds of web application penetration testing tools are available. For clarification, we’re not talking about ‘tools’ as in people. We understand the confusion, because there is a fair amount of web appl...

April 9, 2013

I’m not going to lie, I love Yoo-hoo drinks, to the point that I have at least one a day and get grumpy if I don’t have one available when I want it. Don’t judge me; some people drink, smoke, do drugs, etc. My addiction of choice is Yoo-hoo and I make no apology.

It’s p...

December 20, 2012

It’s getting increasingly difficult to define one information security consulting firm from another; not that we’re all the same, it’s more to do with providing clients with what they really need. That can be tough, especially when they’re on a tight budget. However, e...

December 14, 2012

I was at an information security holiday party that was combined with an open forum discussion on security trends, current interests, and general musings. As always we had a lively discussion on everything from PGP to PCI. The one discussion that really got my interest...

August 14, 2012

6IdeasForCreativePasswordsb

 

 Is there anyone out there who doesn’t know that a more complex password is a better, safer password?  Yet we still see people with passwords that are ‘1234’ and when they really want to add that extra layer of security they go with ‘12345.’  Those aren’t the sor...

July 20, 2012

4CareerBuildingMoves

One of the things Caliber Security Partners provides is select information security recruiting services for our clients.  Once you do anything long enough, you start to notice trends. There are some specific things that security practitioners can do to f...

July 16, 2012

How much is too much?  At what point in time do we reach saturation?  Are the amounts ofinformation security events we currently have too many?  Not enough?  To me there are two types of information security events: those that happen monthly (on a l...

Please reload

Featured Posts

I'm busy working on my blog posts. Watch this space!

Please reload

Recent Posts