Security Through Obscurity – Word Processor Redaction

A couple weeks ago I had a small rant about the HSBC bankruptcy leak, where I found the bank’s reaction to the issue rather surprising. Then this morning as I go through my reading list (it’s Monday), this article from Network World shows that TSA fell into the same problem. However, this most recent article goes into the problem much deeper, especially on the second page of the article. The problem lies in developers, users, and security managers alike not knowing the process of document redaction, and what will and will not properly redact a document. Many people think that … Continue reading Security Through Obscurity – Word Processor Redaction

Active Directory Analysis

A couple of weeks ago I wrote this post because I had just found out that a group of security ‘professionals’ and ‘consultants’ (not from our company) that were assigned to one of my projects did not have the technical ability to download user records, or any other records, from Active Directory (AD) and perform the appropriate ID management analysis. While I am senior management, I do take the pride of being able to do about anything required, including the technical work that is necessary to figure out via Google, MS Support sites, or any other resource – a skill … Continue reading Active Directory Analysis

Altoids Wireless Microphone

I do not know which one came up with the idea first, but these two web pages- AL7FS Jim Larsen and Pirate Nation Radio – show circuit board designs that fit into an Altoids box. But I also remember an IT Infrastructure Manager at a company that I used to work at that always had stacks of Altoids boxes on his desk. Wonder if any of those ‘empty’ boxes was really packing something like this little version. The view from the front is a bit deceiving except for the little yellow tail coming out of the back. For surveillance on … Continue reading Altoids Wireless Microphone