Laws of Power – 20

Do not commit to anyone: It is the fool who always rushes to take sides. Do not commit to any side or cause but yourself. By maintaining your independence, you become the master of others – playing people against one another, making them pursue you. Professional versus personal vignette is the dichotomy I would argue.… Read More

Laws of Power – 16

Use absence to increase respect and honor: Too much circulation makes the price go down: The more you are seen and heard from, the more common you appear. If you are already established in a group, temporary withdrawal from it will make you more talked about, even more admired. You must learn when to leave.… Read More

Laws of Power – 15

Crush your enemy totally: All great leaders since Moses have known that a feared enemy must be crushed completely. (Sometimes they have learned this the hard way.) If one ember is left alight, no matter how dimly it smolders, a fire will eventually break out. More is lost through stopping halfway than through total annihilation:… Read More

Laws of Power – 12

Use selective honesty and generosity to disarm your victim: one sincere and honest move will cover over dozens of dishonest ones. Open hearted gestures of honesty and generosity bring down the guard of even the most suspicious people. Once your selective honesty opens a whole in their armor, you can deceive and manipulate them at… Read More

Corporate Records: Voice-mail

As electronic discovery matures to meet the ever-changing technology landscape, it is incumbent upon the information security practitioner, forensic investigator, General Counsel, or others responsible for the discovery, acquisition, processing, preservation, and presentation of electronic records to keep swimming or risk drowning. There should be no illusion that voicemail would be considered an electronic record… Read More

Social Networks and Social Engineering

I’ve commented occasionally about social networking site and appropriate content posted therein. I’ll share an article I read on a favorite news site. It is an amazing abuse of authority in my opinion. It also demonstrates the hazards of what could happen when low-tech mentality bludgeons high-tech. Original URL: http://www.theregister.co.uk/2009/06/18/american_burg_and_facebook/ US city demands FaceSpaceGooHoo log-ins… Read More

Loose Lips, Sink Ships.

A very common mistake made by employers is to allow an employee investigation to become so informal and disorganized that managers and employees learn about the nature of an investigation. The individual(s) who learn of such facts directly or through the rumor mill often relay embellished or false facts about the employee under investigation.  With… Read More

Cloud Computing: Part 2

Internet information exchange and commerce has matured to the point that we cannot imagine how we would run our businesses without technology anymore. We have created elaborate systems and constructed solid disaster recovery and business continuity mechanisms to protect our digital assets. Until recently, these Internet facing systems have resided on dedicated computers that we… Read More

The lines are blurring

The legal profession, in one form or another, as existed for thousands of years. As with any activity, experience and practice helps us become more proficient, more accurate, more profound. Information security and regulatory activities are relative newcomers in the holistic picture. These pursuits also require vigilance and practice. An interesting phenomenon I believe is… Read More

Cloud Computing, AKA SaaS

Synopsis: The effective weak link of cloud computing: An oversight by a single vendor creates a single point of failure that can have devastating effects on an untold number of its customers. Commentary: Cloud computing is Internet based development and use of computer technology. It is a style of computing in which dynamically scalable and… Read More

Policies, standards, and Guidlines, Oh My!

  My pet project for the past three years has been the Holistic Operational Readiness Security Evaluation wiki, otherwise known as the HORSE Project. In addition to some great audit guidance, security advice, tools, ect, there is a full compliment of policies to use as boilerplates for any organization. Find it all here: http://lazarusalliance.com/horsewiki/ It… Read More