By: - Forensics and Security Expert


Past, Present and Future of Endpoint Security

January 21st, 2014

In the throes of holiday shopping season, 110 million Target customers woke to the news that cleverly placed malware had pilfered their credit- and debit card numbers, along with other sensitive data. We aren’t yet certain who was behind the massive attack on Target and, evidently other large retailers, or how the heist was orchestrated. But [...]

By: - Technology Reporter


Is Mobile Shopping Safer This Holiday Season?

November 26th, 2013

With the holiday shopping season upon us, scammers, cyber criminals and other nefarious characters come out of the Internet woodwork. Security experts are warning consumers should be cautious during the holiday shopping season to protect personal and financial data from being compromised. Banks and retailers should also be on high-alert. Consider just a couple of [...]

By: - IT Security Expert

Avoiding the User Blame Game

October 10th, 2013

It might not be part of any formal forensics or incident response policy, but odds are at most organizations, whenever a malicious hacking attack hits the mark there’s one step rarely missed: blaming the user. Users do some boneheaded things sometimes so pointing the finger at them is easy. But the truth is if IT [...]

By: - IT Security Expert

BYOD or BYOT (Bring Your Own Threat)…The Case for Mobile Devices as Endpoints

May 7th, 2013

Lumension recently conducted a survey of more than 1,600 IT professionals on Linkedin regarding their thoughts on BYOD and mobile security. You can check it out here. There is a lot of interesting information in this survey, with one of the main takeaways was for these respondents’ organizations, BYOD is really all about end-user satisfaction [...]

By: - IT Security Expert

Global 2013 Trends in Data Protection Maturity

March 25th, 2013

Protecting sensitive information has become increasingly difficult the last few years – if you haven’t recognized this fact and modified your security approach recently, you’ve got issues. One reason for this is the explosion of mobile devices on our networks. While convenient for our users and a significant productivity booster for our business, this new [...]

By: - Dir. Solutions Marketing

PSA for Evernote Users: Change Your Passwords

March 4th, 2013

Another day, another breach of a popular cloud-based service. This time it was Evernote, a wildly popular personal note taking app for tablets like iOS devices (iPhones, iPads and iPod Touches) and similar Android devices. The breach was apparently discovered on Thursday 02/28 and made public on Saturday (03/02) morning. Evernote is requiring all of [...]

By: - Forensics and Security Expert


Are You Prepared for the Flood of Gifted Mobile Devices?

January 7th, 2013

It’s the Nightmare Before After Christmas Christmas 2012 may have been a geek’s dream but it will likely become the CIO’s nightmare. As reported by The Daily Mail, Christmas shoppers snapped up one tablet computer EVERY SECOND and retailers report sales up 1,000% over 2011. Tablets were one of the hottest Christmas gifts of 2012 [...]

By: - Chairman and CEO, Lumension


Disheartening Disconnect Identified by 2013 State of Endpoint Risk Study

December 4th, 2012

I’m concerned about the results of our fourth annual State of the Endpoint study just completed by the Ponemon Institute. Over the years, IT pros have reported shrinking confidence in the security of their networks. While this year is no different, the number of IT security pros who responded no, they are not more confident [...]

By: - Forensics and Security Expert


Where Did We Fall on 2012 Predictions?

September 19th, 2012

About this time last year, I wrote out my predictions for the good, bad and ugly of 2012. While pulling together what I think the 2013 IT security landscape will look like (which is the topic of my SecuritySCAPE 2012 presentation and subsequent blog posts here on Optimal Security), it’s always interesting to first look [...]

By: - Forensics and Security Expert


Wipe Your iPhone Before Upgrading to iPhone 5

September 17th, 2012

In the rush to upgrade to a new phone, you are probably tempted to sell off your old phone. Personally, I wouldn’t. But, if you choose to sell it, on eBay or anywhere else, remember to first be thorough in wiping the data. If you don’t, you could be giving away your very valuable data [...]

By: - Dir. Solutions Marketing

Smashing Smishing!

September 5th, 2012


A former colleague pointed me to this video by Mike Saylor, the VP of Technology at the Texas Credit Union League. ‘Smishing’ is a portmanteau of SMS (Short Message Service – so, cell phone text messaging) and phishing (attempting to acquire by subterfuge sensitive personal information such as userIDs, passwords, credit or debit card information, [...]

By: - Forensics and Security Expert


UPDATE QR Codes Leading Lambs To the Slaughter

March 9th, 2012

Update – Today, March 9, a hacktivist blogger “th3j35t3r” Jesters Court revealed that for the last 5 days, they had replaced their Twitter profile picture with a QR code that sent users to a specially crafted malicious website. The malware on the site actually took advantage of a modifified and updated version of the Webkit [...]

By: - IT Security Expert, Author


Best Practice Mobile Security Implementation

February 27th, 2012

Mobile device management is a workplace reality that IT is scrambling to get their arms around. And justifiably so…according to the new report by Symantec, the 2012 State of Mobility Survey, organizations of all sizes are seeing numerous damages due to mobile devices in the workplace, including data loss, damage to the brand and loss [...]

By: - IT Security Expert, Author


Two Approaches to Managing Mobile Devices

February 6th, 2012

There is no question we have entered the era of always connected mobile devices. Smart phones, iPads, and Android devices have changed the way people access information.  Last month, I discussed why denying the use of personal mobile devices isn’t a realistic view. Looking to the future, here are some considerations on how to incorporate [...]

By: - IT Security Expert, Author


Resist Enterprise Mobility? Another Knee Jerk Reaction

December 20th, 2011

I have logged more travel miles than I care to admit in 2011. Throughout it all, I heard significant trepidation from IT security directors and CISO’s over the invasion of their offices with those nasty, uncontrollable personal digital devices that everyone is now armed with: iPhones, Android devices, and iPads.  Especially iPads.  And invariably the [...]

IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us