<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="http://securityincite.com" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
 <title>Mike Rothman&#039;s blog</title>
 <link>http://securityincite.com/blog/mike-rothman</link>
 <description></description>
 <language>en</language>
<item>
 <title>The Pope Visits Security Incite + Securosis</title>
 <link>http://securityincite.com/blog/mike-rothman/the-pope-visits-security-incite-securosis</link>
 <description>&lt;p class=&quot;MsoNormal&quot;&gt;
&lt;img src=&quot;http://www.pragmaticcso.com/Images/finger-pope.jpg&quot; align=&quot;left&quot; height=&quot;180&quot; hspace=&quot;10&quot; vspace=&quot;10&quot; width=&quot;240&quot; /&gt;When I joined eIQ, I did a &lt;a href=&quot;http://securityincite.com/blog/mike-rothman/career-advice-from-the-pope&quot; target=&quot;_blank&quot;&gt;&amp;quot;POPE&amp;quot; analysis&lt;/a&gt;
on the opportunity, to provide a detailed perspective on why I made the move.
The structure of that analysis was pretty well received, so as I make another
huge move, I may as well dust off the POPE and use that metaphor to explain why
I&#039;m &lt;a href=&quot;/blog/mike-rothman/security-incite-contracts-a-case-of-securosis&quot; target=&quot;_blank&quot;&gt;merging Security Incite with Securosis&lt;/a&gt;.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;People&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
Analyzing every “job” starts with the people. I liked the
freedom of working solo, but ultimately I knew that model was inherently
limiting. So thinking about the kind of folks I&#039;d want to work with, a couple
of attributes bubbled to the top. First, they need to be smart. Smart enough to
know when I&#039;m full of crap. They also need to be credible. Meaning I respect
their positions and their ability to defend them, so when they tell me I&#039;m full
of crap - I&#039;m likely to believe them. Any productive research environment must
be built on mutual respect. 
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
Most importantly, they need to stay on an even keel. Being a
pretty excitable type (really!), when around other excitable types the worst
part of my personality surfaces. Yet, when I&#039;m around guys that go with the
flow, I&#039;m able to regulate my emotions more effectively. As I&#039;ve been working
long and hard on personal development, I didn&#039;t want to set myself back by
working with the wrong folks.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
For those of you that know Rich and Adrian, you know they
are smart and credible. They build things and they break them. They’ve both
forgotten more about security than most folks have ever known. Both have been
around the block, screwed up a bunch of stuff and lived to tell the story.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
And best of all, they are great guys. Guys you can sit
around and drink beer with. Guys you looking forward to rolling your sleeves up
with and getting some stuff done. Exactly the kind of guys I wanted to work
with.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;Opportunity&lt;/b&gt;
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
Securosis
will be rolling out a set of information products targeted at accelerating the
success of mid-market security and IT professionals. Let&#039;s just say the
security guy/gal in a mid-market company may be the worst job in IT. They have
many of the same problems as larger enterprises, but no resources or budget.
Yeah, this presents a huge opportunity.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
We also plan to give a lot back to the community. Securosis
publishes all its primary research for free on the blog. We&#039;ll continue to do
that. So we have an opportunity to make a difference in the industry as well.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
To be clear, the objective isn&#039;t to displace Gartner or
Forrester. We aren&#039;t going to build a huge sales force. We will focus on adding
value and helping to make our clients better at their jobs. If we can do that,
everything else works itself out.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;Product&lt;/b&gt;
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
To date, no one has really successfully introduced a
syndicated research product targeted to the mid-market, certainly not in
security. That fact would scare some folks, but for me it&#039;s a huge challenge. I
know hundreds of thousands of companies struggle on a daily basis and need our
help. So I&#039;m excited to start figuring out how to get the products to them.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
In terms of research capabilities, all you have to do is
check out the &lt;a href=&quot;http://securosis.com/research&quot; target=&quot;_blank&quot;&gt;Securosis Research Library&lt;/a&gt; to see the unbelievable
productivity of Rich and Adrian. The library holds a tremendous amount of content
and it&#039;s top notch. As with every business trying something new, we&#039;ll run into
our share of difficulties - but generating useful content won&#039;t be one of them.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;Exit&lt;/b&gt;
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
Honestly, I don&#039;t care about an exit. I&#039;ve proven I can
provide a very nice lifestyle for my family as an independent. That&#039;s
liberating, especially in this kind of economic environment. That doesn&#039;t mean
I question the size of the opportunity. Clearly we have a great opportunity to
knock the cover off the ball and build a substantial company. But I&#039;m not
worried about that. I want to have fun, work with great guys and help our
clients do their jobs better. If we do this correctly, there are no lack of
research and media companies that will come knocking.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;Final thoughts&lt;/b&gt;
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
On the first working day of a new decade, I&#039;m putting the
experiences (and road rash) gained over last 10 years to use. Whether starting
a business, screwing up all sorts of things, embracing my skills as an analyst
or understanding the importance of balance in my life, this is the next logical
step for me.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
Looking back, the past 10 years have been very humbling. It
started with me losing a fortune during the Internet bubble. I&#039;ve sold the
company I founded for the cash on our balance sheet because we couldn&#039;t find
enough customers. I tried to start two other companies - to no avail. I&#039;ve
gotten fired (or laid off) three times. Quite a decade, eh?
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
Yet, I persevere. I lived through that and had lots of
successes as well. Each of those experiences helped me get to this place and
become ready to do this. And I&#039;m ready. So hold on, it&#039;s going to be a great
ride. 
&lt;/p&gt;
&lt;p&gt;
Note: I&#039;ll be writing over
at Securosis moving forward. The blog is &lt;a href=&quot;http://securosis.com/blog&quot; target=&quot;_blank&quot;&gt;http://securosis.com/blog&lt;/a&gt;, and
you can sign up to get our writing via email the link is on the blog web page.
See you there.
&lt;/p&gt;
&lt;p&gt;
&lt;small&gt;
Photo credit: &amp;quot;Pope&amp;quot; originally uploaded by &lt;a href=&quot;http://www.pragmaticcso.com/Images/finger-pope.jpg&quot; target=&quot;_blank&quot;&gt;bayat &lt;/a&gt;
&lt;/small&gt;
&lt;/p&gt;
</description>
 <comments>http://securityincite.com/blog/mike-rothman/the-pope-visits-security-incite-securosis#comments</comments>
 <category domain="http://securityincite.com/news/si-announcements">SI Announcements</category>
 <pubDate>Mon, 04 Jan 2010 09:17:13 -0600</pubDate>
 <dc:creator>Mike Rothman</dc:creator>
 <guid isPermaLink="false">1104 at http://securityincite.com</guid>
</item>
<item>
 <title>Security Incite Contracts a Case of Securosis</title>
 <link>http://securityincite.com/blog/mike-rothman/security-incite-contracts-a-case-of-securosis</link>
 <description>&lt;p&gt;
&lt;img src=&quot;http://www.pragmaticcso.com/Images/logo_securosis_150wide.jpg&quot; align=&quot;right&quot; height=&quot;75&quot; hspace=&quot;15&quot; vspace=&quot;15&quot; width=&quot;300&quot; /&gt;In what is a surprise to probably no one, as of today I&#039;m
joining &lt;a href=&quot;http://securosis.com&quot; target=&quot;_blank&quot;&gt;Securosis&lt;/a&gt; as Analyst/President. For all intents and purposes, Security
Incite and Securosis are merging operations.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
The old adage goes that when one door closes, another opens.
In this case, it&#039;s absolutely true, though not necessarily in that order. Some back-story
will clarify why this makes sense. During the summer of 2008, Rich and I had
decided to start a new research company. We were moving towards launching
around Labor Day 2008.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
Then I got the call, from the only guy I would consider
working for, about joining eIQ. It was a truly agonizing decision for me. I
thought I had something left to prove on the vendor side, and this was an
opportunity that &lt;a href=&quot;http://securityincite.com/blog/mike-rothman/career-advice-from-the-pope&quot; target=&quot;_blank&quot;&gt;I thought had all the pieces for success&lt;/a&gt;. I told Rich this just delayed our plans, but I knew he needed to
keep moving forward, and that he would.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
Over the past 18 months, Rich and Adrian have done a really
great job building the brand of Securosis and establishing a very real and
credible voice on security topics. Best of all, their research philosophy of
&lt;a href=&quot;http://securosis.com/about/totally-transparent-research&quot; target=&quot;_blank&quot;&gt;Totally Transparent Research&lt;/a&gt; totally aligns with my own research philosophy. Truth be told, I have to admit to being jealous when they launched the new Securosis
site because it was everything I thought IT research should be.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
For me, &lt;a href=&quot;http://securityincite.com/blog/mike-rothman/incite-rides-again&quot; target=&quot;_blank&quot;&gt;eIQ didn&#039;t work as I had hoped&lt;/a&gt;. So when I got laid off, the second call I made was to Rich. Yes, I
called the Boss first. Rich, Adrian and I decided to move forward as one
entity. We plan to build the next great IT research firm.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
Yes, I could have stayed solo. In just the few weeks I&#039;ve
been back on the research side, I have lots of activity in the works. But that
limits my ability to deliver pragmatic and actionable information to the grossly
underserved market of mid-market IT and security professionals. This strategy will
become clear in the coming weeks as we unveil our research products strategy
and our individual research agendas.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
Equally important, I’m surrounding myself with guys I
respect enough to push me, but also guys that I really enjoy hanging out with.
In retrospect, I really missed the collegial and challenging environment I
experienced as a META Group analyst. Working by myself was great, but I know I
want to really make a difference in this space. That means I&#039;ve got to partner
with like-minded individuals who will hold me accountable and tell me when my
stuff sucks. 
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
Rest assured, one of the reasons I am following this path is
because Rich, Adrian and I have similar philosophies on pretty much everything.
We&#039;ve decided to keep the Securosis &amp;quot;brand&amp;quot; as the company name, but
many aspects of Security Incite will integrate with the Securosis offerings. So
you&#039;ll see a &amp;quot;Securosis Incite&amp;quot; blog post every week and all of our
research will be &amp;quot;Pragmatic&amp;quot; in nature.
&lt;/p&gt;
&lt;p class=&quot;MsoNormal&quot;&gt;
I&#039;m really excited for the next stage in my personal journey
as part of Securosis. Later today I&#039;ll be doing a &lt;a href=&quot;http://securityincite.com/securosis-pope&quot; target=&quot;_blank&quot;&gt;POPE analysis of the move&lt;/a&gt; and
we&#039;ve posted a &lt;a href=&quot;http://securosis.com/blog/securosis-incite-merger-faq&quot; target=&quot;_blank&quot;&gt;FAQ up on the Securosis blog&lt;/a&gt;. If you haven’t already,
you&#039;ll want to add the Securosis blog (&lt;a href=&quot;http://securosis.com/feeds/blog&quot; target=&quot;_blank&quot;&gt;http://securosis.com/feeds/blog&lt;/a&gt;)
to your RSS reader or get our stuff via email to keep current. The links for
email newsletter signup are on the blog page. 
&lt;/p&gt;
&lt;p&gt;
Though this ends Security
Incite as a stand-alone research entity, it&#039;s really the beginning of something
with far more potential. Thanks for supporting me over the past few years.
Really truly thanks.
&lt;/p&gt;
</description>
 <comments>http://securityincite.com/blog/mike-rothman/security-incite-contracts-a-case-of-securosis#comments</comments>
 <category domain="http://securityincite.com/news/si-announcements">SI Announcements</category>
 <pubDate>Mon, 04 Jan 2010 08:59:57 -0600</pubDate>
 <dc:creator>Mike Rothman</dc:creator>
 <guid isPermaLink="false">1103 at http://securityincite.com</guid>
</item>
<item>
 <title>The Daily Incite - 12/28/09 - Meyer&#039;s Choice</title>
 <link>http://securityincite.com/blog/mike-rothman/the-daily-incite-12-28-09-meyers-choice</link>
 <description>&lt;div style=&quot;text-align: center&quot; id=&quot;topcontent&quot;&gt;
&lt;img src=&quot;http://www.geronimollc.com/Geronimo/DailyInciteTopBanner2.jpg&quot; style=&quot;width: 448px; height: 107px&quot; alt=&quot;Today&#039;s Daily Incite&quot; /&gt;
&lt;/div&gt;
&lt;div style=&quot;font-size: 10pt; font-family: Arial&quot; id=&quot;leftcontent&quot;&gt;
&lt;h2&gt;December 27, 2009 - Volume 4, #42 &lt;/h2&gt;
Good Morning:
&lt;p&gt;
What would you do if a Doctor told you that your job may kill
you? And I&#039;m not talking about those brave souls that paint suspension
bridges. Or wash skyscraper windows. Or jump over Snake River Canyon in
a rocket ship. Or are Siegfried and Roy. But if you had a great job
like being a big time college football coach, and your doctor told you
the job could kill you, what to do?
&lt;/p&gt;
&lt;p&gt;
&lt;img src=&quot;http://www.pragmaticcso.com/Images/meyer_alone.jpg&quot; style=&quot;border: 0px solid ; width: 240px; height: 160px; float: right&quot; alt=&quot;Taking the lonely walk into the sunset...&quot; hspace=&quot;10&quot; vspace=&quot;10&quot; /&gt;That&#039;s the choice faced by
Urban Meyer, the coach of the University of Florida, who&#039;s Doctors
advised him that the stress of his job caused him tightness in his
chest and other problematic health issues. He&#039;s reached the pinnacle of
success. He&#039;s won two national championships over the past 3 years. He
makes $4 million a year. He&#039;s also 45 years old and a husband and
parent of three children.
&lt;/p&gt;
&lt;p&gt;
Do you just walk away? Or do you try to change your stressful
ways? That&#039;s the choice. Can you just walk away? What about the
expectations of the recruits? Of the boosters? Of yourself? Could you
take the risk, knowing that the stress could cause an express ride to a
casket?
&lt;/p&gt;
&lt;p&gt;
Meyer almost did the right thing. He had decided to walk away.
And then the sharks and other folks that &amp;quot;care&amp;quot; about him convinced him
to back off on retirement. He&#039;s taking an &amp;quot;indefinite leave of absence&amp;quot;
from coaching. Initially he said he wouldn&#039;t coach again. Now he&#039;s
saying he plans to return, presumably after he works through his stress
issues. Basically, says he&#039;s choosing to live or at least give
himself the best chance to not drop dead from stress. But we&#039;ll see how
it works out. 
&lt;/p&gt;
&lt;p&gt;
The one thing I can&#039;t stand is inconsistency. This must have
been an agonizing decision. Meyer really loves what he does and he
cares about the kids. But really, the decision shouldn&#039;t have been that
hard. This is a guy who has nothing left to prove. He never needs to
work again. Not for money anyway. The only fact that matters is that
you can&#039;t walk your daughter down the aisle if you are dead. That&#039;s the
first and only thought I&#039;d have.
&lt;/p&gt;
&lt;p&gt;
I guess it&#039;s easy for me to say, but I truly believe this
would be an easy decision for me. Maybe that&#039;s why I&#039;m not a big time
football coach or a captain of industry. I&#039;m not willing to sacrifice
my life or my health anymore for another digit on my net worth or
another ostentatious ring that I wouldn&#039;t wear anyway. I&#039;ve made it a
point to work really hard to reduce my stress. I find I get stressed
out over stupid stuff now. Which is progress. With a lot more work, I
hope to not get stressed over stupid stuff either. That&#039;s the goal. And
I plan to get there.&lt;br /&gt;
&lt;/p&gt;
&lt;p&gt;
This will be my last Incite of the year. Have a
great holiday. 
&lt;/p&gt;
PS: In my first draft of this post, I called it &amp;quot;Choose Life,&amp;quot; which
honestly I thought was a much better title (and would have resulted in
much better open rates). But obviously that term has connotations I&#039;m
not going to touch. Not in the Incite, not in a one on one conversation
either. As a general practice, I don&#039;t engage in conversation about
religion, politics, or abortion. I have my opinions on all of those
matters, and you probably do too. You may agree with mine or you may
not. But I&#039;m not going to change your mind, so I don&#039;t even try.
&lt;p&gt;
&lt;br /&gt;
&lt;small&gt;Photo: &amp;quot;&lt;span style=&quot;font-style: italic&quot;&gt;Urban&lt;/span&gt;&amp;quot;
originally uploaded
by &lt;a href=&quot;http://www.flickr.com/photos/killmylandlord/2826039970/&quot; target=&quot;_blank&quot;&gt;killmylandlord&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;small&gt;Technorati: &lt;a href=&quot;http://technorati.com/tag/information%20security&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Information
Security&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;&lt;/small&gt;,&lt;small&gt;&lt;a href=&quot;http://www.technorati.com/tag/Security%20Mike&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Security
Mike&lt;/a&gt;, &lt;a href=&quot;http://www.technorati.com/tag/Internet%20Security&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Internet
Security&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;/p&gt;
&lt;table style=&quot;width: 481px; height: 276px; text-align: left; margin-left: auto; margin-right: auto&quot; border=&quot;0&quot; cellpadding=&quot;5&quot; cellspacing=&quot;2&quot;&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td style=&quot;text-align: center; width: 208px&quot;&gt;&lt;a href=&quot;http://www.pragmaticcso.com&quot;&gt;&lt;img src=&quot;http://www.pragmaticcso.com/Images/P-CSO-Cover-170w.jpg&quot; alt=&quot;The Pragmatic CSO&quot; style=&quot;border: 0px solid ; width: 170px; height: 259px&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;The
			Pragmatic CSO: &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Available Now! &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Read the Intro and
			Get &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&amp;quot;5 Tips to be a
			Better CSO&amp;quot;&lt;/span&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;a href=&quot;http://www.pragmaticcso.com/&quot; target=&quot;_blank&quot; style=&quot;font-weight: bold&quot;&gt;www.pragmaticcso.com&lt;/a&gt;&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;br /&gt;
			&lt;span style=&quot;font-family: Arial&quot;&gt;&lt;/span&gt;&lt;/td&gt;
			&lt;td style=&quot;text-align: center&quot;&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;big&gt;&lt;big&gt;&lt;big&gt;Follow
			me on Twitter:&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;/span&gt;&lt;a href=&quot;http://www.twitter.com/securityincite&quot; target=&quot;_blank&quot;&gt;@securityincite&lt;/a&gt;&lt;/big&gt;&lt;/big&gt;&lt;/big&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;img src=&quot;http://www.pragmaticcso.com/Images/twitter-logo.jpg&quot; style=&quot;width: 225px; height: 82px&quot; alt=&quot;Twitter&quot; /&gt;&lt;br /&gt;
			&lt;br /&gt;
			I&#039;m not sure where I&#039;m going, but I&#039;ll get there in 140 characters - or
			less...&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;
&lt;h1&gt;Incite 4 U&lt;/h1&gt;
&lt;br /&gt;
&lt;ol&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Make a
	difference in 2010&lt;/span&gt; - As I railed a few weeks ago, the end
	of the year is always predictions season. And yes Shimmy, I&#039;ve made my
	share of useless prognostications, some of which have been decent,
	others have sucked pretty bad. Leave it to the Hoff to shake things up
	a bit and decide that getting back into BayWatch shape is critical to
	be well positioned for yet another Knight Rider sequel. &lt;a href=&quot;http://www.rationalsurvivability.com/blog/?p=1639&quot; target=&quot;_blank&quot;&gt;Chris has an interesting list of resolutions&lt;/a&gt;
	and most focus on a single theme and that is to make a difference. Man,
	that is insightful. We spend a lot of time (me included) in the echo
	chamber focused on what is fs*cked and not on taking action to make it
	better. I&#039;ve got a bunch of resolutions on my end as well (now that
	I&#039;ve been given another chance to contribute with no agenda). So take a
	few minutes, take Chris&#039; lead and think to yourself how can you make a
	difference in 2010.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;We&#039;re taking
	advice from this guy? &lt;/span&gt;- I have to constantly remind
	myself how big the world is &amp;quot;out there.&amp;quot; That the list of security
	movers and shakers that I hang with is really a self-selecting bunch
	and that it doesn&#039;t really represent what is happening in the broader
	market. So I always check out the business press coverage of security,
	like this &lt;a href=&quot;http://www.forbes.com/2009/12/20/cloud-computing-rsa-technology-cio-network-coviello.html&quot; target=&quot;_blank&quot;&gt;Forbes interview with EMC/RSA&#039;s Art Coviello&lt;/a&gt;
	about cloud security. There is nothing outright offensive in the
	interview, since it&#039;s the same standard party line. But that&#039;s not the
	point, it&#039;s that we need to make a concerted effort to think more
	broadly and empathize with the IT manager who doesn&#039;t eat, sleep and
	breath this stuff. Basically, &lt;a href=&quot;http://layer8.itsecuritygeek.com/layer8/dont-ask-me-ask-that-guy-over-there&quot; target=&quot;_blank&quot;&gt;what Shrdlu said&lt;/a&gt;. &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Lessons from
	the &amp;quot;Great Recession&amp;quot; &lt;/span&gt;- What have you learned over the
	past 18 months? About doing more with less, or maybe doing something
	with nothing? &lt;a href=&quot;http://searchcio-midmarket.techtarget.com/news/article/0,289142,sid183_gci1377004,00.html&quot; target=&quot;_blank&quot;&gt;This piece on SearchCIO-midmarket&lt;/a&gt;
	isolates a few tips that two end users learned. My take aways from the
	piece are that automation is great, but of course doesn&#039;t create new
	jobs (duh!). And that it always gets back to talking business to
	business people. Trying to talk tech isn&#039;t going to go over very well.
	Finally, I like the idea of someone to watch the watchers. One of the
	users in the piece contracts with a 3rd party to oversee their service
	providers. Given the complexity of a lot of environments, it seems like
	a good idea.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Revisiting
	your backup strategy for 2010 &lt;/span&gt;- Yes, at the end of the
	year you should be doing some housecleaning, but more importantly
	making sure that your processes are buttoned up and you&#039;ve got the
	critical Plan B for everything. &lt;a href=&quot;http://www.networkworld.com/news/2009/121709-is-backing-up-online.html&quot; target=&quot;_blank&quot;&gt;This post on NetworkWorld asks a legitimate
	question about whether online backup is safe.&lt;/a&gt; I use it and a
	lot of my security focused pals use a service as well. Is there risk in
	having your data out there? Yes. Is it manageable? I think so. But more
	importantly, the online backup is really the contingency plan. I
	replicate all my critical data between three separate machines via
	Windows Live Sync, both to make sure I keep everything in sync, but
	also that in the event I lose a drive I&#039;m protected. If I have to rely
	on my online backup, a number of things have gone terribly wrong.
	What&#039;s your disaster recovery (or hardware failure) plan? Is it
	Tailgate Tested? Tailgate Approved!&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Response
	rates drive fraud&lt;/span&gt; - Sometimes (though not too often) it&#039;s
	helpful to have some experience in marketing and to understand the
	underlying math on response rates. &lt;a href=&quot;http://www.eweek.com/c/a/Security/Phishing-Attacks-Cost-Millions-Despite-Low-Success-Rate-879602&quot; target=&quot;_blank&quot;&gt;This piece on eWeek points to some Trusteer
	research&lt;/a&gt; that says although phishing is a very low response
	rate effort, the successes are so lucrative the bad guys are still
	making a good living. And that&#039;s really the point. The incremental cost
	of sending phishing emails is close to zero, so if anyone responds -
	that is profit. And as long as these guys make a profit, they are going
	to keep doing it - A LOT.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Just test the
	web apps&lt;/span&gt; - Some security folks still are clinging to this
	idea of having to do all the work themselves. Yes, that mentality is
	going away, but you still have resistance to some security services and
	especially security testing for systems and applications. I&#039;ve always
	said that you can&#039;t outsource thinking, which means the strategy and
	oversight of the security program, but everything else should be fair
	game. And now there are &lt;a href=&quot;http://searchcio-midmarket.techtarget.com/tip/0,289483,sid183_gci1377140,00.html&quot; target=&quot;_blank&quot;&gt;lots of options for external parties to test
	web apps&lt;/a&gt;. In a perfect world, we&#039;d have all the staffing we
	need to test everything that is at risk. This ain&#039;t Kansas Dorothy, so
	get help where you can. Not only do these folks bring resources, they
	also bring expertise you may not have on your internal team. &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Do you want
	to know what your DLP system tells you? &lt;/span&gt;- The Mogull has
	been all over this for years, but a lot of folks don&#039;t realize the
	impact and issues of trying to get on top of leak prevention. First
	off, it&#039;s a process, which means if you think you&#039;ll write a check and
	make the problem go away - forget it. You need to understand what you
	need to protect and where it is - BEFORE you install a product. More to
	the point, you need to be willing to deal with what you find. This
	piece on &lt;a href=&quot;http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=222002843&quot; target=&quot;_blank&quot;&gt;Dark Reading summarizes the process to think
	about DLP&lt;/a&gt; and then &lt;a href=&quot;http://www.terminal23.net/2009/12/coming_to_terms_with_data_loss.html&quot; target=&quot;_blank&quot;&gt;LonerVamp comes to terms&lt;/a&gt; with the
	fact that DLP is not necessarily a security thing - it&#039;s a way to
	identify faulty business processes (that put sensitive data at risk)
	and to keep employees from inadvertently compromising data. &lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
</description>
 <comments>http://securityincite.com/blog/mike-rothman/the-daily-incite-12-28-09-meyers-choice#comments</comments>
 <category domain="http://securityincite.com/security-incite-rants/daily-incite">Daily Incite</category>
 <pubDate>Mon, 28 Dec 2009 09:15:18 -0600</pubDate>
 <dc:creator>Mike Rothman</dc:creator>
 <guid isPermaLink="false">1102 at http://securityincite.com</guid>
</item>
<item>
 <title>The Daily Incite - 12/22/09 - Are we there Yeti?</title>
 <link>http://securityincite.com/blog/mike-rothman/the-daily-incite-12-22-09-are-we-there-yeti</link>
 <description>&lt;div id=&quot;topcontent&quot; style=&quot;text-align: center&quot;&gt;
&lt;img src=&quot;http://www.geronimollc.com/Geronimo/DailyInciteTopBanner2.jpg&quot; alt=&quot;Today&#039;s Daily Incite&quot; style=&quot;width: 448px; height: 107px&quot; /&gt;
&lt;/div&gt;
&lt;div id=&quot;leftcontent&quot; style=&quot;font-size: 10pt; font-family: Arial&quot;&gt;
&lt;h2&gt;December 22, 2009 - Volume 4, #41 &lt;/h2&gt;
Good Morning:
&lt;p&gt;
Another of my holiday rituals is the annual pilgrimage up
North to spend the winter break with my in-laws. This involves first
packing up the family truckster, which includes the optional roof rack
just to ensure we can fill the car to the gills with crap we don&#039;t need
for a 10 day journey. But I gave up trying to get the Boss to pack the
stuff we actually &amp;quot;need,&amp;quot; so I just dutifully load up the car and get
ready to go.
&lt;/p&gt;
&lt;p&gt;
&lt;img src=&quot;http://www.pragmaticcso.com/Images/fun_yeti.jpg&quot; alt=&quot;Hope your chimney is really big....&quot; style=&quot;border: 0px solid ; width: 240px; height: 180px; float: right&quot; hspace=&quot;10&quot; vspace=&quot;10&quot; /&gt;The drive takes between
10-11 hours depending on traffic. Most of my friends send their
condolences a day or two ahead of the trip, knowing what it would be
like to spend 11 hours in a car with their kids. But I have to give
thanks to Moore&#039;s Law, which has enabled us modern conveniences like
the portable DVD player and the car stereo with the AUX jack, so my
kids can watch movies for 10 hours, while I drive.
&lt;/p&gt;
&lt;p&gt;
Truth be told, the trip is a lot harder on the Boss than it is
on me. She&#039;s actually got to deal with them for 10 hours. Between the
elbowing (it&#039;s amazing how even in a 7 person van, the kids have to
poke and prod each other for a majority of the trip), the constant
hunger pangs, the &amp;quot;are we there yet?&amp;quot; questions and the arguments about
who gets to pick the next movie, I&#039;m just glad to be the designated
driver.
&lt;/p&gt;
&lt;p&gt;
After 6 years of making this drive, everyone knows my process
already. I get pretty grumpy when packing the car, since I know we
don&#039;t need half the stuff we are taking. I get even grumpier when we
are trying to get out of the house, since it takes an hour to do the
last 5% of stuff to finally get on the road. And about 2 hours in, I
get into the zone. I&#039;ve got my iPod cranking music, the kids have
settled in, and I just drive.
&lt;/p&gt;
&lt;p&gt;
This year the Boss got a lot smarter about movie selection.
Part of her agony was having to watch the kids movies/shows for 10
hours. I mean, who wouldn&#039;t be homicidal after listening to 4 hours of
the Wiggles, and have another 6 hours to go? But this year, she hit the
bargain basement DVD bin and came back with gems like &lt;a href=&quot;http://www.imdb.com/title/tt0107048/&quot; target=&quot;_blank&quot;&gt;Groundhog
Day&lt;/a&gt; and &lt;a href=&quot;http://www.imdb.com/title/tt0088763/&quot; target=&quot;_blank&quot;&gt;Back to the Future&lt;/a&gt;. Amazingly
enough, the kids enjoyed those classics and my wife was reasonably sane.
&lt;/p&gt;
&lt;p&gt;
But this trip was a bit different in that we were trying to
beat a pretty severe winter storm. The original plan was to leave
around noon, but we called an audible at the line and decided to take
off around 9 AM, and a good thing we did. We were literally on the
front end of the storm that dumped almost 2 feet of snow on the
Mid-Atlantic region. There were times we got ahead of the storm and
were able to motor, but during the next potty or gas stop, the weather
seemed to catch up and drop snow on us. If we hadn&#039;t left early, we may
still be on the road.
&lt;/p&gt;
&lt;p&gt;
On the last gas stop as the snow was really starting to fall, I could
have sworn I saw the Yeti saunter in and buy a case of Bud. He was
about 8 feet tall, had white hair all over, and was wearing a Lynyrd
Skynyrd shirt. Who knew that the abominable snowman loved Southern
Rock? I asked if he needed a lift further North, but he politely said a
couple of feet of snow and a case of Bud was all he needed. Now that is
a guy that understands his definition of happiness.&lt;br /&gt;
&lt;/p&gt;
&lt;p&gt;
Have a
great day. &lt;br /&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;br /&gt;
&lt;small&gt;Photo: &amp;quot;&lt;span style=&quot;font-style: italic&quot;&gt;Happy
Fun Yeti!&lt;/span&gt;&amp;quot; originally uploaded
by &lt;a href=&quot;http://www.flickr.com/photos/spitecho/4156094659/&quot; target=&quot;_blank&quot;&gt;spitecho&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;small&gt;Technorati: &lt;a href=&quot;http://technorati.com/tag/information%20security&quot; rel=&quot;tag&quot; target=&quot;_blank&quot;&gt;Information
Security&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;&lt;/small&gt;,&lt;small&gt;&lt;a href=&quot;http://www.technorati.com/tag/Security%20Mike&quot; rel=&quot;tag&quot; target=&quot;_blank&quot;&gt;Security
Mike&lt;/a&gt;, &lt;a href=&quot;http://www.technorati.com/tag/Internet%20Security&quot; rel=&quot;tag&quot; target=&quot;_blank&quot;&gt;Internet
Security&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;/p&gt;
&lt;table style=&quot;width: 481px; height: 276px; text-align: left; margin-left: auto; margin-right: auto&quot; border=&quot;0&quot; cellpadding=&quot;5&quot; cellspacing=&quot;2&quot;&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td style=&quot;text-align: center; width: 208px&quot;&gt;&lt;a href=&quot;http://www.pragmaticcso.com&quot;&gt;&lt;img src=&quot;http://www.pragmaticcso.com/Images/P-CSO-Cover-170w.jpg&quot; style=&quot;border: 0px solid ; width: 170px; height: 259px&quot; alt=&quot;The Pragmatic CSO&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;The
			Pragmatic CSO: &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Available Now! &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Read the Intro and
			Get &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&amp;quot;5 Tips to be a
			Better CSO&amp;quot;&lt;/span&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;a href=&quot;http://www.pragmaticcso.com/&quot; style=&quot;font-weight: bold&quot; target=&quot;_blank&quot;&gt;www.pragmaticcso.com&lt;/a&gt;&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;br /&gt;
			&lt;span style=&quot;font-family: Arial&quot;&gt;&lt;/span&gt;&lt;/td&gt;
			&lt;td style=&quot;text-align: center&quot;&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;big&gt;&lt;big&gt;&lt;big&gt;Follow
			me on Twitter:&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;/span&gt;&lt;a href=&quot;http://www.twitter.com/securityincite&quot; target=&quot;_blank&quot;&gt;@securityincite&lt;/a&gt;&lt;/big&gt;&lt;/big&gt;&lt;/big&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;img src=&quot;http://www.pragmaticcso.com/Images/twitter-logo.jpg&quot; alt=&quot;Twitter&quot; style=&quot;width: 225px; height: 82px&quot; /&gt;&lt;br /&gt;
			&lt;br /&gt;
			I&#039;m not sure where I&#039;m going, but I&#039;ll get there in 140 characters - or
			less...&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;
&lt;h1&gt;Incite 4 U&lt;/h1&gt;
&lt;br /&gt;
&lt;ol&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;All hail Czar
	Howard&lt;/span&gt; - Just as many of the pundits didn&#039;t think there
	would a US Cyber Czar appointed, it looks like &lt;a href=&quot;http://www.nytimes.com/2009/12/22/technology/internet/22cyber.html?_r=1&quot; target=&quot;_blank&quot;&gt;Howard Schmidt will be under the White House
	Xmas tree&lt;/a&gt; this year. And all I can do is shake my head a bit
	and wish him good luck. Howard knows the folks that need to be
	known both in industry and within the Beltway, but part of me just
	figures this is moving more deck chairs around the Titanic. Will he be
	empowered? What is his metric of success? Maybe the public announcement
	will clarify these things, but most likely not. I suspect the best gift
	you can get Howard is a Redskins helmet. He&#039;ll need it as he bangs his
	head against the wall in DC for the next couple of years. &lt;br /&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Playing both
	sides of the cyber-ball &lt;/span&gt;- Given that a new Cyber-Czar has
	been named, it&#039;s interesting to check out &lt;a href=&quot;http://blogs.gartner.com/john_pescatore/2009/12/04/trying-to-mix-cyberoffense-and-cyberdefense-is-a-bad-idea/&quot; target=&quot;_blank&quot;&gt;John Pescatore&#039;s post here about playing
	cyber-offense and defense&lt;/a&gt;, and his point that the guys that
	play offense (hackers, et al) are not the right guys to be protecting
	the flanks. He speaks the truth because any senior security position is
	more political than technical now. It&#039;s about persuasion and
	operations, not about IPS Kung Fu. To be clear, John makes the point
	that the flow of information from the offensive minded is important (to
	know what you are defending against), but the skill sets are different.
	Yes, pragmatic fellow that Pescatore. &lt;br /&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;FIRE burning
	on the dance floor &lt;/span&gt;- It&#039;s always interesting to see how
	other constituencies view security companies. This piece on &lt;a href=&quot;http://seekingalpha.com/article/179249-sourcefire-is-in-a-bright-spot-but-don-t-get-burned&quot; target=&quot;_blank&quot;&gt;Seeking Alpha about an investor&#039;s analysis
	of SourceFire&lt;/a&gt; is interesting. The guy makes interesting
	points about the seasonality of the business, and also has valuation
	concerns (what&#039;s the issue with a 60x earnings multiple?). But
	ultimately the stock right now is a mo-mo play. High valuation, but
	good growth and the Street pays a premium for that. But it also means
	that what the Street giveth, it will taketh away - at the first
	indication of slowing growth.&lt;br /&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Who&#039;s that
	router talking to? &lt;/span&gt;- A lot of us have spent years in the
	trenches and take a lot of good security practice for granted, which is
	always a dangerous thing. This piece by &lt;a href=&quot;http://searchmidmarketsecurity.techtarget.com/tip/0,289483,sid198_gci1374061,00.html&quot; target=&quot;_blank&quot;&gt;Joel Snyder on SearchSecurity is a good
	reminder that we need to be well aware of who and what our edge devices
	are doing&lt;/a&gt;. Joel&#039;s point here is to make sure outside access
	on promiscuous protocols like SNMP is turned off, which is good advice.
	It gets back to my opinion of Network Security 101. Lock down the
	traffic that is allowed to enter (yes, default deny), make sure you
	understand the traffic flows on your networks and look for what is
	different. Given we are dealing with an infinite attack surface,
	looking for anomalies is one of the only ways to keep pace.&lt;br /&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Amen to Risk
	Adjectives&lt;/span&gt; - &lt;a href=&quot;http://1raindrop.typepad.com/1_raindrop/2009/12/2010-goal-1-no-more-general-risk.html&quot; target=&quot;_blank&quot;&gt;Great post and point by Gunnar&lt;/a&gt;
	about the need to lose the generic &amp;quot;risk&amp;quot; term from our vernacular.
	Without some means to describe what risk we are talking about (the
	aforementioned adjective), the term is meaningless. And that&#039;s always
	been my big problem with anything risk-centric. The term can mean
	something different to everyone, and therefore it means nothing. So if
	you hear the &amp;quot;R&amp;quot; word come out of your mouth, make sure it&#039;s qualified
	so there is no uncertainty about what kind of risk you are talking
	about.&lt;br /&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Cisco&#039;s
	non-existent Security Strategy&lt;/span&gt; - Kudos to Jon Oltsik for
	beating me to the punch in &lt;a href=&quot;http://www.networkworld.com/community/node/49121&quot; target=&quot;_blank&quot;&gt;questioning what Cisco is doing in security
	nowadays&lt;/a&gt;. My sentiments exactly. Since Jayshree Ullal left,
	it seems there is no one driving Cisco&#039;s security strategy. The STBU is
	really IronPort with new business cards. I mean, how old is the frackin
	Self-Defending Network? Cisco is making announcements around the fringe
	and not really evolving their strategy to deal with the evolution of
	the attack surface. As Oltsik points out, Cisco is still moving a lot
	of equipment, but that&#039;s because they are Cisco - not because the
	products are reflecting the market reality. You don&#039;t think of Cisco as
	a follower, but in security that&#039;s exactly what they&#039;ve become. &lt;br /&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Facing your
	own demons &lt;/span&gt;- Many of us know Bill Brenner of CSO. You&#039;ve
	probably spoken to him or at a minimum read his stuff at TechTarget or
	his current gig. But you didn&#039;t really &amp;quot;know&amp;quot; Bill. I certainly didn&#039;t.
	But through his new personal blog, &lt;a href=&quot;http://billbrenner1970.wordpress.com/&quot; target=&quot;_blank&quot;&gt;The
	OCD Diaries&lt;/a&gt;, I am getting to know Bill a lot better. I knew
	he was funny and a bit quirky (who in security isn&#039;t?), but in reading
	about his battles to address his mental health issues and deal with
	loss, you gain a real appreciation for the man and for his courageous
	journey. Not many have the stones to bare their soul in a public forum,
	but those that do can teach all of us a lot. Keep up the good work
	Bill, both on the blog and on yourself.&lt;br /&gt;
	&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
</description>
 <comments>http://securityincite.com/blog/mike-rothman/the-daily-incite-12-22-09-are-we-there-yeti#comments</comments>
 <category domain="http://securityincite.com/security-incite-rants/daily-incite">Daily Incite</category>
 <pubDate>Tue, 22 Dec 2009 09:21:16 -0600</pubDate>
 <dc:creator>Mike Rothman</dc:creator>
 <guid isPermaLink="false">1101 at http://securityincite.com</guid>
</item>
<item>
 <title>The Daily Incite - 12/17/09 - Changing my Xmas Tune</title>
 <link>http://securityincite.com/blog/mike-rothman/the-daily-incite-12-17-09-changing-my-xmas-tune</link>
 <description>&lt;div style=&quot;text-align: center&quot; id=&quot;topcontent&quot;&gt;
&lt;img src=&quot;http://www.geronimollc.com/Geronimo/DailyInciteTopBanner2.jpg&quot; style=&quot;width: 448px; height: 107px&quot; alt=&quot;Today&#039;s Daily Incite&quot; /&gt;
&lt;/div&gt;
&lt;div style=&quot;font-size: 10pt; font-family: Arial&quot; id=&quot;leftcontent&quot;&gt;
&lt;h2&gt;December 17, 2009 - Volume 4, #40 &lt;/h2&gt;
Good Morning: &lt;br /&gt;
&lt;p&gt;I tend to be fairly grumpy, but no time more than during the holidays.
I&#039;m not a fan of the cold weather. And I&#039;ve been a Xmas hater. That&#039;s
right, I was Scrooge personified. Bah humbug was a mantra of mine from
the time lights go up in my neighborhood Thanksgiving weekend to the
day after New Year&#039;s when (thankfully) most folks pull them down.
&lt;/p&gt;
&lt;p&gt;
&lt;img src=&quot;http://www.pragmaticcso.com/Images/santa-on-phone.jpg&quot; style=&quot;border: 0px solid ; width: 180px; height: 240px; float: right&quot; alt=&quot;What did you think happened on the day after Xmas....&quot; vspace=&quot;10&quot; hspace=&quot;10&quot; /&gt;You know, this &lt;a href=&quot;http://www.youtube.com/watch?v=6drWVCJHYqg&quot; target=&quot;_blank&quot;&gt;classic South Park song&lt;/a&gt; says it
all. But this year is different. I&#039;m not sure whether it&#039;s the fact
that the stress of my old job is now gone. Or whether I&#039;ve just
mellowed out, but all the same - I&#039;m not as grumpy. And I can
appreciate the lights and the even some of the pomp and circumstance of
the holiday season. I didn&#039;t instantly hush one of the kids that
spontaneously broke into a Xmas song.
&lt;/p&gt;
&lt;p&gt;
Yet, I&#039;m still human and there are the little annoyances. Like the guy
whose lights burn up more power than an Eastern European village
(hackers and all). I&#039;m still not digging the constant sound of the Xmas
Muzak pretty much wherever I am. A week ago I was having sushi with the
Boss and the joint was playing Xmas tunes. Just can&#039;t see Santa digging
on a Spicy Tuna roll, but maybe he does. Right after the big pull off
the hookah.
&lt;/p&gt;
&lt;p&gt;
And what&#039;s the deal with the emergence of Rudolf as a pitch
reindeer? Come on now, if Santa uses AT&amp;amp;T&#039;s wireless network
everyone is screwed. I can just imagine it, the dude is traipsing
around the world at almost light speed, he calls Mrs. Claus to make
sure she&#039;s got the hot coco ready when he gets home and the call drops.
Maybe Steve Jobs can get Santa one of those new iPhones that runs on
the Verizon network...
&lt;/p&gt;
&lt;p&gt;
I&#039;m even kind of looking forward to Xmas day this year. I&#039;ll
spend it as most of my ilk do every year. I&#039;ll go see a movie (maybe Up
in the Air) and eat a Chinese food feast with my family. And I&#039;ll get
to do some of those tasks that always get lost in the haze that is my
to-do list. Like updating my web site.
&lt;/p&gt;
&lt;p&gt;
So it&#039;s all good. I don&#039;t think I&#039;ll go caroling this year,
but you never know about next year. But before you get any big ideas,
don&#039;t be sending my any of those fruit cakes. You have to draw the line
somewhere.&lt;br /&gt;
&lt;br /&gt;
Have a
great weekend. &lt;br /&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;br /&gt;
&lt;small&gt;Photo: &amp;quot;&lt;span style=&quot;font-style: italic&quot;&gt;Santa
has a side job&lt;/span&gt;&amp;quot; originally uploaded
by &lt;a href=&quot;http://www.flickr.com/photos/ktylerconk/3092187449/&quot; target=&quot;_blank&quot;&gt;ktylerconk&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;small&gt;Technorati: &lt;a href=&quot;http://technorati.com/tag/information%20security&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Information
Security&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;&lt;/small&gt;,&lt;small&gt;&lt;a href=&quot;http://www.technorati.com/tag/Security%20Mike&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Security
Mike&lt;/a&gt;, &lt;a href=&quot;http://www.technorati.com/tag/Internet%20Security&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Internet
Security&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;/p&gt;
&lt;table style=&quot;width: 481px; height: 276px; text-align: left; margin-left: auto; margin-right: auto&quot; border=&quot;0&quot; cellpadding=&quot;5&quot; cellspacing=&quot;2&quot;&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td style=&quot;text-align: center; width: 208px&quot;&gt;&lt;a href=&quot;http://www.pragmaticcso.com&quot;&gt;&lt;img src=&quot;http://www.pragmaticcso.com/Images/P-CSO-Cover-170w.jpg&quot; alt=&quot;The Pragmatic CSO&quot; style=&quot;border: 0px solid ; width: 170px; height: 259px&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;The
			Pragmatic CSO: &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Available Now! &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Read the Intro and
			Get &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&amp;quot;5 Tips to be a
			Better CSO&amp;quot;&lt;/span&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;a href=&quot;http://www.pragmaticcso.com/&quot; target=&quot;_blank&quot; style=&quot;font-weight: bold&quot;&gt;www.pragmaticcso.com&lt;/a&gt;&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;br /&gt;
			&lt;span style=&quot;font-family: Arial&quot;&gt;&lt;/span&gt;&lt;/td&gt;
			&lt;td style=&quot;text-align: center&quot;&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;big&gt;&lt;big&gt;&lt;big&gt;Follow
			me on Twitter:&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;/span&gt;&lt;a href=&quot;http://www.twitter.com/securityincite&quot; target=&quot;_blank&quot;&gt;@securityincite&lt;/a&gt;&lt;/big&gt;&lt;/big&gt;&lt;/big&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;img src=&quot;http://www.pragmaticcso.com/Images/twitter-logo.jpg&quot; style=&quot;width: 225px; height: 82px&quot; alt=&quot;Twitter&quot; /&gt;&lt;br /&gt;
			&lt;br /&gt;
			I&#039;m not sure where I&#039;m going, but I&#039;ll get there in 140 characters - or
			less...&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;
&lt;h1&gt;Incite 4 U&lt;/h1&gt;
&lt;br /&gt;
&lt;ol&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;More
	&amp;quot;shortcuts&amp;quot; to PCI compliance&lt;/span&gt; - Arghhh. Just as I was in a
	happy mood, I see yet another &amp;quot;shortcut&amp;quot; story for compliance. &lt;a href=&quot;http://www.networkworld.com/community/node/48908&quot; target=&quot;_blank&quot;&gt;NetworkWorld&#039;s Cisco blogger&lt;/a&gt; has a
	nugget of wisdom &amp;quot;&lt;span style=&quot;font-style: italic&quot;&gt;By now
	we all know that the key to becoming PCI compliant is all about how
	well you can control the number of in-scope devices.&lt;/span&gt;&amp;quot; Ah,
	not so much. A merchant with only 10 in-scope devices that gets pwned
	because they read this kind of crap is still pwned, right? What we all
	better know by now is that PCI compliance is NOT the goal. It&#039;s
	protecting the private data, right? So then there are 5 tips in the
	post about things like segmentation and tunneling and other stuff. Not
	sure I get the one about client certificates vs. tokens, but all the
	same. I kind of shut down when the first sentence shows this guy got
	hit with the security no-clue bat. &lt;br /&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Great, now we
	are all accountants &lt;/span&gt;- Santa takes a bit of time away from
	getting &lt;a href=&quot;http://www.securitycatalyst.com/join-the-journey-launching-catalyst-ontour-and-coming-to-your-house/&quot; target=&quot;_blank&quot;&gt;his house on wheels ready for the adventure&lt;/a&gt;
	(good luck man, I tend to like to know my house is in the same place
	every day, but whatever floats your boat) to try to draw the parallel
	between IT folks and finance folks. You see, evidently finance folks
	understand that all of their actions will be audited and therefore they
	act accordingly. Us IT Yahoos have no idea, so we do crazy stuff. He
	suggests &lt;a href=&quot;http://www.securitycatalyst.com/getting-behind-the-wheel-driving-audit-and-compliance&quot; target=&quot;_blank&quot;&gt;we build a &amp;quot;culture of compliance,&lt;/a&gt;&amp;quot;
	so everyone knows their actions will be audited and they&#039;ll do the
	right thing. How about building a CULTURE OF SECURITY? You know, where
	we protect data first and fill out reports second. I hope that&#039;s what
	Santa means, but the idea of a culture of compliance irks me. It&#039;s bad
	enough compliance funds everything we do, now everyone wants to make
	that the end goal. Which is just wrong. &lt;br /&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Attack of the
	Prediction Stories 1 &lt;/span&gt;- Now I&#039;m starting to remember why I
	hated the holidays. All these freakin&#039; 2010 prediction stories that say
	the same damn thing. More hackers. More breaches. We&#039;re screwed. Enjoy
	the Yule log and maybe OD on egg nog. It&#039;ll make the pain go away. &lt;a href=&quot;http://blog.imperva.com/2009/12/industrialized-hacking-heads-top-five-data-security-trends-for-2010.html&quot; target=&quot;_blank&quot;&gt;Imperva is calling for &amp;quot;industrialized
	hacking,&amp;quot;&lt;/a&gt; as if that hasn&#039;t been the case for years. We all
	know there are warehouses full of folks in 3rd world nations banging
	away on netbooks hacking your stuff. And a move from &amp;quot;reactive to
	pro-active security.&amp;quot; Man, the bile that just rose from my gut didn&#039;t
	taste too good. Come on guys. Mediocre attempt here.&lt;br /&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Attack of the
	Prediction Stories 2 &lt;/span&gt;- Next up on the prediction hit list
	is &lt;a href=&quot;http://securityblog.verizonbusiness.com/2009/12/15/2010-security-predictions&quot; target=&quot;_blank&quot;&gt;Russ Cooper from Verizon Business&lt;/a&gt;.
	He&#039;s got some gems in there like the social network sites will protect
	themselves. Ah, do you think Facebook wants to be a cesspool of
	malware? Miraculously they&#039;ll figure it out in 2010? Looks like Russ
	bypassed the egg nog and went right for the heroin. How about consumers
	getting smarter? Evidently he hasn&#039;t left his lake house in rural
	Canada in YEARS. If what I see in coffee shops or hear at holiday
	parties is any indication, consumers are on the express train to
	Dumbville. But he does pinpoint two predictions I&#039;m digging. The first
	being China will be blamed for everything (shouldn&#039;t they be) and the
	other is that nothing of note happens to &amp;quot;non-PC&#039;s.&amp;quot; &lt;br /&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Attack of the
	Prediction Stories 3&lt;/span&gt; - Finally, let me call out a &lt;a href=&quot;http://www.csoonline.com/article/510776/10_Predictions_for_2010_Kaminsky_and_Weatherford&quot; target=&quot;_blank&quot;&gt;piece in CSOOnline getting predictions from
	security luminaries&lt;/a&gt;, including Mark Weatherford (CISO of CA)
	and Dan Kaminsky. There is stuff here from Weatherford on hiring and
	maintaining talent (good call) and moving some security functions into
	the cloud (ho hum). Kaminsky talks about how prosecution for
	cyber-crime will accelerate (that would be great) and some ineffective
	security techniques will be called out (much to the chagrin of Big AV).
	This one isn&#039;t bad as far as prediction stories, but the only
	prediction I have is that the electricity required to power Kaminsky&#039;s
	ego causes a Xmas brownout in Seattle. Put that in your stocking. Yeah,
	I couldn&#039;t help it. It was right there calling to me. Like Russ
	Cooper&#039;s heroine.&lt;br /&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;NSS kicks
	some IPS vendors in the nuggets&lt;/span&gt; - I tend to disregard most
	reviews and &amp;quot;certification&amp;quot; programs because well, folks have this
	nasty habit of not biting the hand that feeds them. Except me maybe
	(remember the &lt;a href=&quot;http://securityincite.com/blog/mike-rothman/networkworld-bids-me-adieu&quot; target=&quot;_blank&quot;&gt;NetworkWorld debacle&lt;/a&gt;?) So kudos to
	the &lt;a href=&quot;http://www.prweb.com/releases/2009/12/prweb3320364.htm&quot; target=&quot;_blank&quot;&gt;NSS folks that call some crappy IPS products
	to the carpet&lt;/a&gt; and actually print effectiveness results. Of
	course, in the press release they don&#039;t say which vendor got 17%
	effectiveness (&lt;a href=&quot;http://www.networkworld.com/news/2009/120709-ips-tests.html&quot; target=&quot;_blank&quot;&gt;it was Juniper&lt;/a&gt;) and which was 89%
	(yay for SourceFire), but I&#039;m sure the happy vendors plunked down their
	$1800 to buy the report and will be happy to share it with you. The sad
	vendors are well, sad and trying to figure out how to poke holes in the
	methodology. Here&#039;s a hint: Kevin Tolly is waiting by the phone for
	your call. For $50K, he&#039;ll run at test that shows 100% catch rate and
	make the problem go away. &lt;br /&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Hi, I&#039;m Mike
	and I&#039;m a... &lt;/span&gt;- In today&#039;s personal development selection,
	let&#039;s look at a post on the 37Signals blog called &amp;quot;&lt;a href=&quot;http://37signals.com/svn/posts/2051-step-one-is-admitting-you-have-a-problem&quot; target=&quot;_blank&quot;&gt;Step one is admitting you have a problem.&lt;/a&gt;&amp;quot;
	The point here is about work addiction and that the start-up world
	tends to breed many work addicts. They ask the right questions about
	time vs. effectiveness and the impact of that to your health. Is that
	work done between 10 PM and 2 AM productive? Is it good work? I guess
	during the holiday season the message is that we should be questioning
	everything and potentially acknowledging our problems and building 2010
	plans to address them. And maybe relaxing a bit for the slog that is
	2010. &lt;br /&gt;
	&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
</description>
 <comments>http://securityincite.com/blog/mike-rothman/the-daily-incite-12-17-09-changing-my-xmas-tune#comments</comments>
 <category domain="http://securityincite.com/security-incite-rants/daily-incite">Daily Incite</category>
 <pubDate>Thu, 17 Dec 2009 08:01:51 -0600</pubDate>
 <dc:creator>Mike Rothman</dc:creator>
 <guid isPermaLink="false">1100 at http://securityincite.com</guid>
</item>
<item>
 <title>The Daily Incite - 12/15/09 - Finding the Path</title>
 <link>http://securityincite.com/blog/mike-rothman/the-daily-incite-12-15-09-finding-the-path</link>
 <description>&lt;div id=&quot;topcontent&quot; style=&quot;text-align: center&quot;&gt;
&lt;img src=&quot;http://www.geronimollc.com/Geronimo/DailyInciteTopBanner2.jpg&quot; alt=&quot;Today&#039;s Daily Incite&quot; style=&quot;width: 448px; height: 107px&quot; /&gt;
&lt;/div&gt;
&lt;div id=&quot;leftcontent&quot; style=&quot;font-size: 10pt; font-family: Arial&quot;&gt;
&lt;h2&gt;December 15, 2009 - Volume 4, #39 &lt;/h2&gt;
Good Morning: &lt;br /&gt;
When I announced that I was &lt;a href=&quot;http://securityincite.com/blog/mike-rothman/incite-rides-again&quot; target=&quot;_blank&quot;&gt;getting back into the analyst game&lt;/a&gt;,
the post was surprisingly well received. There were a number of aspects
that seemed to resonate with you folks (at least that&#039;s how it seemed
from all the well wishes and emails I received). But no statement got
as much feedback as this one:&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;margin-left: 40px; font-style: italic&quot;&gt;
You
see, life is a journey and I&#039;m finally starting to realize that there
is no right path or wrong path. There is only the path.&lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;
&lt;img src=&quot;http://www.pragmaticcso.com/Images/yellow-brick-road.jpg&quot; alt=&quot;You are programmed to follow this path...&quot; style=&quot;border: 0px solid ; width: 240px; height: 213px; float: right&quot; vspace=&quot;10&quot; hspace=&quot;10&quot; /&gt; &lt;br /&gt;
Lots of folks are trying
to find that path. Maybe they are not happy in their current gig. Maybe
they think they should be doing more. Maybe they just went through a
job transition and it&#039;s not everything they thought it would be. It
could be anything, but the only thing everyone seemed to have in common
was that they thought they were on the wrong path and wanted to know
how to get onto the right path.&lt;br /&gt;
&lt;br /&gt;
The short answer is that I have NO idea. Zero, zilch, not a clue. The
direction I&#039;m going feels right. I think it&#039;s right. Remember
that I&#039;m an analyst, so I&#039;m trained to critical look at every plan and
poke holes in it. I can certainly find holes in my current plans, but
I&#039;m comfortable with those holes and the risks they entail.
&lt;/p&gt;
&lt;p&gt;
But at the end of the day, I don&#039;t know if this is the right
move for me. Truth be told, I don&#039;t think it matters. That&#039;s the entire
point of the statement above. Regardless of the outcome, it&#039;s really
the process that matters. To use a trite self-help moniker: It really
is about the journey.
&lt;/p&gt;
&lt;p&gt;
The Boss got me a shirt from Life is Good for my birthday. It
says &amp;quot;The Journey IS the Destination.&amp;quot; And I think that&#039;s right. We are
all very focused on achieving something. From the time we were little,
we&#039;ve been focused on following that yellow brick road to get to
Emerald City. It&#039;s a programmed response. Yet when we get there,
inevitably you wonder if it was worth the blood, the sweat, the tears.
And if you don&#039;t get there, you wonder what&#039;s the matter with you? Why
can&#039;t you get there?&lt;br /&gt;
&lt;br /&gt;
Gosh, just writing the post is making me tired. Tired of trying to live
up to my unrealistic expectations. Tired of being dissatisfied with all
I&#039;ve accomplished. Tired of applying some one else&#039;s definition of
success to my situation. So I&#039;m doing my best to stop that. And I&#039;m
also doing my best to counsel other folks of the dangers of that
mentality. I spent most of my 30&#039;s fat and angry. All the stress took a
real physical toll on me, and if you identify with my sentiments, then
it&#039;s taking a toll on you too. 
&lt;/p&gt;
&lt;p&gt;
It&#039;s not easy to turn off a lifetime of programming,
especially when your management, mentors, family, and most everyone
else expects you to do something. To achieve something. To make them
proud. That&#039;s why blazing my own trail makes the most sense right now.
I&#039;m only gated by my own expectations, not everyone else&#039;s. I know that
not an option for everyone, but beating to your own drum certainly is.&lt;br /&gt;
&lt;br /&gt;
And to be honest, I like the sound of my own drum. Have a
great day. &lt;br /&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;br /&gt;
&lt;small&gt;Photo: &amp;quot;&lt;span style=&quot;font-style: italic&quot;&gt;follow
the yellow brick road&lt;/span&gt;&amp;quot; originally uploaded
by &lt;a href=&quot;http://www.flickr.com/photos/ittybittiesforyou/3397370852/&quot; target=&quot;_blank&quot;&gt;ittybittiesforyou&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;small&gt;Technorati: &lt;a href=&quot;http://technorati.com/tag/information%20security&quot; rel=&quot;tag&quot; target=&quot;_blank&quot;&gt;Information
Security&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;&lt;/small&gt;,&lt;small&gt;&lt;a href=&quot;http://www.technorati.com/tag/Security%20Mike&quot; rel=&quot;tag&quot; target=&quot;_blank&quot;&gt;Security
Mike&lt;/a&gt;, &lt;a href=&quot;http://www.technorati.com/tag/Internet%20Security&quot; rel=&quot;tag&quot; target=&quot;_blank&quot;&gt;Internet
Security&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;/p&gt;
&lt;table style=&quot;width: 481px; height: 276px; text-align: left; margin-left: auto; margin-right: auto&quot; border=&quot;0&quot; cellpadding=&quot;5&quot; cellspacing=&quot;2&quot;&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td style=&quot;text-align: center; width: 208px&quot;&gt;&lt;a href=&quot;http://www.pragmaticcso.com&quot;&gt;&lt;img src=&quot;http://www.pragmaticcso.com/Images/P-CSO-Cover-170w.jpg&quot; style=&quot;border: 0px solid ; width: 170px; height: 259px&quot; alt=&quot;The Pragmatic CSO&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;The
			Pragmatic CSO: &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Available Now! &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Read the Intro and
			Get &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&amp;quot;5 Tips to be a
			Better CSO&amp;quot;&lt;/span&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;a href=&quot;http://www.pragmaticcso.com/&quot; style=&quot;font-weight: bold&quot; target=&quot;_blank&quot;&gt;www.pragmaticcso.com&lt;/a&gt;&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;br /&gt;
			&lt;span style=&quot;font-family: Arial&quot;&gt;&lt;/span&gt;&lt;/td&gt;
			&lt;td style=&quot;text-align: center&quot;&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;big&gt;&lt;big&gt;&lt;big&gt;Follow
			me on Twitter:&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;/span&gt;&lt;a href=&quot;http://www.twitter.com/securityincite&quot; target=&quot;_blank&quot;&gt;@securityincite&lt;/a&gt;&lt;/big&gt;&lt;/big&gt;&lt;/big&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;img src=&quot;http://www.pragmaticcso.com/Images/twitter-logo.jpg&quot; alt=&quot;Twitter&quot; style=&quot;width: 225px; height: 82px&quot; /&gt;&lt;br /&gt;
			&lt;br /&gt;
			I&#039;m not sure where I&#039;m going, but I&#039;ll get there in 140 characters - or
			less...&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;
&lt;h1&gt;Incite 4 U&lt;/h1&gt;
&lt;br /&gt;
&lt;ol&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;WAF hits the
	clouds&lt;/span&gt; - Akamai introduced the first of the &lt;a href=&quot;http://www.akamai.com/html/about/press/releases/2009/press_121409.html&quot; target=&quot;_blank&quot;&gt;&amp;quot;cloud-based&amp;quot; WAF offerings&lt;/a&gt;
	yesterday. OK, maybe the first. Basically it&#039;s a managed web
	application firewall (WAF) service. I suspect there are other service
	providers that will provision and manage a WAF for customers. But this
	is the first that is pushing the &amp;quot;cloud&amp;quot; halo and thus will get the
	press benefits of announcing a shiny object. The service is based on
	ModSecurity and it&#039;s interesting how Akamai is talking about
	&amp;quot;instantaneous scaling of defenses,&amp;quot; which is good for whatever
	hardware vendor they are using to build out the service.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;FISMA
	metrics, vendors start your engines &lt;/span&gt;- Looks like the Feds
	are getting more serious about cyber-security. That is, if you think
	spending a bunch of money on a bunch of products that likely will have
	little impact on true security is getting more serious. There is &lt;a href=&quot;http://www.federalnewsradio.com/?nid=35&amp;amp;sid=1837795/&quot; target=&quot;_blank&quot;&gt;a set of &amp;quot;FISMA metrics&amp;quot; in process&lt;/a&gt;
	include mostly yes/no answers and then some level of detail on things
	like asset management, connection management, incident management, etc.
	Most interesting is the need to provide &amp;quot;real time security status and
	management,&amp;quot; which is basically SIEM. But here&#039;s the rub: There is a
	difference between having data and USING DATA. I guess you can&#039;t really
	use data until you have it, but I just worry a lot of agencies will
	spend a lot of money and be in exactly the same spot 3 years from now.
	But at least a bunch of security vendors will make a lot of money. &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Know what
	you&#039;re looking for... &lt;/span&gt;- David Mortman has an interesting
	post on the New School site pushing us to realize that &lt;a href=&quot;http://newschoolsecurity.com/2009/11/less-is-more/&quot; target=&quot;_blank&quot;&gt;Less is More&lt;/a&gt;. In this case, he&#039;s
	talking about IPS signatures, in that if you have a good understanding
	of your network, then you should be able to put rules in place to focus
	on abnormal activity (as opposed to checking for everything). I&#039;ve
	always been a big fan of anomaly-based security techniques and positive
	security models (like default deny on perimeter defenses) because it
	forces you to really understand how the network and technology assets
	are being used. Not just letting everything happen and hoping that you
	figure it out before the card brands inform you of the breach. &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Learning from
	someone else&#039;s pain &lt;/span&gt;- The folks that screwed up the FAA
	network a few weeks ago are in a world of hurt. Yeah, when you knock
	down the network that controls flights for half the country, that is a
	bad day. But what can we learn to make sure this kind of thing doesn&#039;t
	happen to you. That&#039;s what the &lt;a href=&quot;http://searchcio.techtarget.com/tip/0,289483,sid182_gci1375561,00.html&quot; target=&quot;_blank&quot;&gt;SearchSecurity folks did in this post&lt;/a&gt;
	and the tips are useful. Remember, usually it&#039;s the physical layer, but
	a lot goes back to change management as well. Ultimately, things are
	going to happen (Murphy&#039;s Law guarantees that), so you need to have
	better fault isolation and response mechanisms in place. If the system
	goes down for 15 minutes, that is bad. When it goes down for 5 hours,
	heads roll. Make sure it&#039;s not your head.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Monitoring
	the cloud is not up to us&lt;/span&gt; - Get ready for a lot of folks
	talking about how they will provide &amp;quot;visibility in the cloud.&amp;quot; &lt;a href=&quot;http://blog.loglogic.com/2009/12/post.php&quot; target=&quot;_blank&quot;&gt;The
	folks at LogLogic are talking about this&lt;/a&gt;, but I&#039;m not
	specifically picking on them since they aren&#039;t the only one. Here&#039;s the
	issue, the cloud provider doesn&#039;t want you to know what is going on.
	They don&#039;t want you monitoring networks or systems and will make it
	hard, if not impossible for you to do that. So the idea of visibility
	at the lower levels of the cloud-resident stack is a load of crap. It&#039;s
	really about understanding and monitoring the stuff you DO control, and
	that&#039;s the application stack. So we are going to need to see some
	instrumentation and interesting correlation happening with application
	information (logs, performance, etc.) to have any chance of seeing into
	the cloud.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Network
	Security getting smarter?&lt;/span&gt; - McAfee just made a series of
	announcements &lt;a href=&quot;http://finance.yahoo.com/news/McAfee-Inc-First-to-Deliver-bw-1375422278.html&quot; target=&quot;_blank&quot;&gt;upgrading their network security devices&lt;/a&gt;
	with the underlying theme being increased intelligence. The idea is
	that Little Red sees a lot of stuff at the endpoint, device and network
	layer and can make sense of it to make each of their products
	&amp;quot;smarter.&amp;quot; In concept it&#039;s interesting, but realistically my jury is
	still out until there are demonstrable results that show protection is
	enhanced. More tactically, they&#039;ve finally rebranded the Securify stuff
	as &lt;a href=&quot;http://www.networkworld.com/news/2009/120809-mcafee-security-appliance.html&quot; target=&quot;_blank&quot;&gt;the T-series&lt;/a&gt; to provide some level
	of flow-based analysis and security. To be clear, folks like Sourcefire
	have had these pieces for quite a while. But the trend is the trend,
	intelligence is definitely making it&#039;s way into all parts of the
	security stack. &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Life
	Management, Drucker-style &lt;/span&gt;- As you may have noticed, I&#039;ve
	tried to find one interesting personal development post to add to each
	Incite. Today&#039;s comes courtesy of WebWorkerDaily, who highlight a &lt;a href=&quot;http://webworkerdaily.com/2009/12/14/get-a-total-life-in-2010&quot; target=&quot;_blank&quot;&gt;new book that delves into the great Peter
	Drucker&#039;s thoughts on life management&lt;/a&gt;. We all knew he was a
	corporate management guru, but evidently has some good stuff to say
	about managing your live as well. In a nutshell it&#039;s about finding
	balance. That balance involves understanding your strengths, but also
	diversifying a bit. So the idea of having a parallel &amp;quot;career&amp;quot; or
	serious hobby is a good one. All work and no play makes Mikey a dull
	boy. I also like the idea of giving back and teaching/mentoring. If you
	are anything like me, you&#039;ve screwed up a whole bunch of stuff through
	the years and other can benefit from that &amp;quot;experience.&amp;quot; &lt;/li&gt;&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
&lt;/ol&gt;
&lt;/div&gt;
</description>
 <comments>http://securityincite.com/blog/mike-rothman/the-daily-incite-12-15-09-finding-the-path#comments</comments>
 <category domain="http://securityincite.com/security-incite-rants/daily-incite">Daily Incite</category>
 <pubDate>Tue, 15 Dec 2009 08:18:01 -0600</pubDate>
 <dc:creator>Mike Rothman</dc:creator>
 <guid isPermaLink="false">1099 at http://securityincite.com</guid>
</item>
<item>
 <title>The Daily Incite - 12/11/09 - Starbucks Seat Lottery</title>
 <link>http://securityincite.com/blog/mike-rothman/the-daily-incite-12-11-09-starbucks-seat-lottery</link>
 <description>&lt;div style=&quot;text-align: center&quot; id=&quot;topcontent&quot;&gt;
&lt;img src=&quot;http://www.geronimollc.com/Geronimo/DailyInciteTopBanner2.jpg&quot; style=&quot;width: 448px; height: 107px&quot; alt=&quot;Today&#039;s Daily Incite&quot; /&gt;
&lt;/div&gt;
&lt;div style=&quot;font-size: 10pt; font-family: Arial&quot; id=&quot;leftcontent&quot;&gt;
&lt;h2&gt;December 11, 2009 - Volume 4, #38 &lt;/h2&gt;
Good Morning: &lt;br /&gt;
Nowadays I face very tough decision on a daily basis. You know, when
should I work out? Do I get the Veggie Patty at Subway or is it the one
day a week I indulge with a burrito? Should I shave? You know I shave
once a week, whether I need to or not. These are serious, tough
decisions. And I&#039;m the kind of guy that can face these decisions.&lt;br /&gt;
&lt;p&gt;
&lt;img src=&quot;http://www.pragmaticcso.com/Images/coffee-shop-office.jpg&quot; style=&quot;border: 0px solid ; width: 180px; height: 240px; float: right&quot; alt=&quot;Another day in the life of an office vagabond...&quot; vspace=&quot;10&quot; hspace=&quot;10&quot; /&gt;But no decision is more
important than where I work in the afternoon. You see, being a work at
home vagabond, I need to get out of the house. Every day. Personal
hygiene is an issue to begin with, so without the excuse that I have to
primp up to get my Venti Pike - it wouldn&#039;t be pretty.&lt;br /&gt;
&lt;br /&gt;
So around my house I have the choice of maybe 4-6 different coffee
shops. To minimize my impact on the environment, I try to select a shop
in proximity to my lunch spot. I&#039;m thinking of buying some carbon
offsets to make up for those indecisive days when I drive the extra 10
minutes to a different coffee shop.
&lt;/p&gt;
&lt;p&gt;
I also go to different coffee shops in no set pattern. I
wouldn&#039;t want the folks tailing me to be able to profile my habits. You
know, when the assassins come, I want to make it at least challenging
to find me. 
&lt;/p&gt;
&lt;p&gt;
Yet lately I&#039;ve been choosing wrong. I liken the coffee shop
decision to playing the lottery. It&#039;s the Starbuck&#039;s seating lottery.
If you don&#039;t get a good seat, you may as well just write off the entire
day. Have you ever tried writing snark from one of those cushy purple
chairs? This ain&#039;t Passover folks, I can&#039;t be inciteful when I&#039;m
reclining. I need to be focused. I need to have a hard wooden chair.&lt;br /&gt;
&lt;br /&gt;
Yesterday I got to my selected shop and there were no seats. Crap. It
was like 40 degrees outside, so it&#039;s not like I could sit on the patio
and pound away at my trusty MBP and snark. The nerve of these folks.
First of all, don&#039;t they know it&#039;s my friggin&#039; office. I pay rent. At
the rate of about $2.25 per day. Of course it&#039;s a good deal, and some
folks pay more rent than me (they splurge on the $4.50 pumpkin latte),
but all the same, these folks have to go. 
&lt;/p&gt;
&lt;p&gt;
So what to do? I guess I could ask someone if I could share
the table, but man that&#039;s weird. I saw some guy do that a few weeks
ago. He just plops down and then starts some inane conversation about
what he does, and where he lives and all sorts of other things.
Surprisingly enough, the kind woman who let this interloper sit down
actually engaged him in conversation. I guess maybe that is what humans
do. I wouldn&#039;t know much about that.&lt;br /&gt;
&lt;br /&gt;
So basically I did what most other vagabonds do. I went to the
struggling cafe down the street, and hoped they haven&#039;t gone out of
business already.
&lt;/p&gt;
Have a
great weekend. &lt;br /&gt;
&lt;p&gt;
&lt;br /&gt;
&lt;small&gt;Photo: &amp;quot;&lt;span style=&quot;font-style: italic&quot;&gt;Second
(office) Cup&lt;/span&gt;&amp;quot; originally uploaded
by &lt;a href=&quot;http://www.flickr.com/photos/sylvaincarle/2291459041/&quot; target=&quot;_blank&quot;&gt;sylvaincarle&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;small&gt;Technorati: &lt;a href=&quot;http://technorati.com/tag/information%20security&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Information
Security&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;&lt;/small&gt;,&lt;small&gt;&lt;a href=&quot;http://www.technorati.com/tag/Security%20Mike&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Security
Mike&lt;/a&gt;, &lt;a href=&quot;http://www.technorati.com/tag/Internet%20Security&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Internet
Security&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;/p&gt;
&lt;table style=&quot;width: 481px; height: 276px; text-align: left; margin-left: auto; margin-right: auto&quot; border=&quot;0&quot; cellpadding=&quot;5&quot; cellspacing=&quot;2&quot;&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td style=&quot;text-align: center; width: 208px&quot;&gt;&lt;a href=&quot;http://www.pragmaticcso.com&quot;&gt;&lt;img src=&quot;http://www.pragmaticcso.com/Images/P-CSO-Cover-170w.jpg&quot; alt=&quot;The Pragmatic CSO&quot; style=&quot;border: 0px solid ; width: 170px; height: 259px&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;The
			Pragmatic CSO: &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Available Now! &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Read the Intro and
			Get &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&amp;quot;5 Tips to be a
			Better CSO&amp;quot;&lt;/span&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;a href=&quot;http://www.pragmaticcso.com/&quot; target=&quot;_blank&quot; style=&quot;font-weight: bold&quot;&gt;www.pragmaticcso.com&lt;/a&gt;&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;br /&gt;
			&lt;span style=&quot;font-family: Arial&quot;&gt;&lt;/span&gt;&lt;/td&gt;
			&lt;td style=&quot;text-align: center&quot;&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;big&gt;&lt;big&gt;&lt;big&gt;Follow
			me on Twitter:&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;/span&gt;&lt;a href=&quot;http://www.twitter.com/securityincite&quot; target=&quot;_blank&quot;&gt;@securityincite&lt;/a&gt;&lt;/big&gt;&lt;/big&gt;&lt;/big&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;img src=&quot;http://www.pragmaticcso.com/Images/twitter-logo.jpg&quot; style=&quot;width: 225px; height: 82px&quot; alt=&quot;Twitter&quot; /&gt;&lt;br /&gt;
			&lt;br /&gt;
			I&#039;m not sure where I&#039;m going, but I&#039;ll get there in 140 characters - or
			less...&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;
&lt;h1&gt;Incite 4 U&lt;/h1&gt;
&lt;br /&gt;
&lt;ol&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Data is cool,
	analysis is better&lt;/span&gt; - The folks at &lt;a href=&quot;http://securityblog.verizonbusiness.com/2009/12/09/2009-dbir-supplemental/&quot; target=&quot;_blank&quot;&gt;Verizon Business released their DBIR
	supplemental report&lt;/a&gt; this week and it&#039;s got some good stuff in
	there. Read. It. Now. I like the report because it&#039;s not just a listing
	of data designed to generate PR clips. Most of the data out there is
	used to ensure that lazy tech writers always have something they can
	crank out on deadline. Survey this, survey that. 85% of hackers take
	cream in their coffee. 42% use an pwned netbook in a crowded coffee
	shop to social engineer 17% of the grandmothers in a local old age
	community. You know, data. But what the VZ guys do with the data is
	very cool. &lt;a href=&quot;http://securosis.com/blog/verizon-2009-dbir-supplement&quot; target=&quot;_blank&quot;&gt;Mort highlights a few things&lt;/a&gt;, but
	I think we are getting to the point where this data is not only
	statistically reliable, but it&#039;s also representative of the broader
	market. And that means we are pretty much screwed, but at least we can
	quantify the screw.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Redefining
	security success &lt;/span&gt;- Bejtlich does an interesting thought
	experiment in his &amp;quot;&lt;a href=&quot;http://taosecurity.blogspot.com/2009/12/let-hundred-flowers-blossom.html&quot; target=&quot;_blank&quot;&gt;Let a Hundred Flowers Blossom&lt;/a&gt;&amp;quot;
	post. Basically, the idea is to stop worrying about controls and start
	focusing on outcomes. Meaning, an organization can do as much or as
	little security as they want, as long as it takes longer than X for an
	attack team to successfully penetrate the defenses, it&#039;s all good. It&#039;s
	an interesting idea, but is counter to the childish way we do security
	today. Basically it&#039;s like nursery school. You get a check list and you
	do the checklist. No one cares about success or even outcomes, as long
	as the check list is filled out. This will create issues of documenting
	compliance, but from a philosophy standpoint I think this could work in
	a company. But probably not for every company. &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Budget time,
	yay! &lt;/span&gt;- It&#039;s that time of year, budget time. This is when
	we all fight for our share of a declining pie and the grumble about
	what an ass the CFO is and how does he/she expect us to be able to do
	anything with that amount of money. And then you get calls from
	analysts that want to know how big your budget is. And &lt;a href=&quot;http://news.yahoo.com/s/ibd/20091202/bs_ibd_ibd/20091202tech&quot; target=&quot;_blank&quot;&gt;we get surveys that say 70% of companies
	will boost tech spending and security is a priority&lt;/a&gt;. Maybe
	it&#039;s &lt;a href=&quot;http://www.eweek.com/c/a/IT-Management/Security-Virtualization-Top-2010-IT-Budget-Wish-List-419142&quot; target=&quot;_blank&quot;&gt;1 or 2 on the wish lists&lt;/a&gt; of people
	buying things. But to be clear, no one has any idea how budgets will
	shake out. You see, there is a pot of money and through 2010 that pot
	may be smaller or it may get bigger. It may be used for Project A or
	maybe be reallocated to Project B. The folks that answer these surveys
	have no idea. Overall it feels like things are getting a bit better,
	but who knows. I&#039;m still saving for a rainy day because there is a good
	likelihood it&#039;ll keep raining in 2010. &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Actually
	buying something with that budget &lt;/span&gt;- Pretty entertaining
	post on Cassandra Security about &lt;a href=&quot;http://cassandrasecurity.com/?p=932&quot; target=&quot;_blank&quot;&gt;the
	real process of buying and selling security stuff&lt;/a&gt;. Part of
	this is the black magic that you never learn until you work for a
	vendor. Things like the unnatural acts to get a deal closed in a
	quarter (as opposed to when the customer needs to buy). But also from
	the customer&#039;s perspective, how to play the game, not only to squeeze
	the vendor, but to make sure the deal gets done. There are checklists
	for sales folks and also for the end users. As Brian says, a lot of
	this is common sense, but we all know that common sense is in short
	supply.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Are there any
	security &amp;quot;software&amp;quot; companies left?&lt;/span&gt; - Yes, that title was
	a bit of a red herring, but it underscores the realization that
	customers tend to be right, and the vendors need to adapt to meet the
	needs of the customer. So the idea of a pure-play security software
	company probably doesn&#039;t make a lot of sense moving forward. Maybe not
	today, but by 2011 I&#039;d say any security company of size will have to
	have a hybrid model. Where their software is PACKAGED as something a
	customer can implement, can run in someone&#039;s data center or probably
	can run in a private or public cloud. If you look at &lt;a href=&quot;http://www.darkreading.com/vulnerability_management/security/app-security/showArticle.jhtml?articleID=222001304&quot; target=&quot;_blank&quot;&gt;a company like Fortify, they are moving in
	this direction by rolling their own services capability&lt;/a&gt;, but
	also by partnering with a services shop like White Hat to fill the
	gaps. Of course, the underlying life blood of any of these companies is
	still software, but it won&#039;t necessarily be sold as software.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Microsoft,
	the silent but deadly security competitor&lt;/span&gt; - Given I talked
	about plungers last time, I had to throw some flatulence references
	into today&#039;s piece. But that&#039;s the thing about Microsoft. They don&#039;t
	really talk too much about their security products, since most of the
	PR effort is spent spinning the issues around Patch Tuesday and their
	SDL efforts. But to be clear, Microsoft keeps clicking along, targeting
	their markets and rolling products. Like their recent announcements of &lt;a href=&quot;http://www.eweek.com/c/a/Windows/Microsoft-Releases-Two-New-Enterprise-Security-Platforms-263887&quot; target=&quot;_blank&quot;&gt;enhanced security gateway functionality&lt;/a&gt;.
	Sure looks like a UTM type thing to me, which is perfect for their
	sweet spot in the mid-market. And &lt;a href=&quot;http://www.sentillion.com/media/press/091210.html&quot; target=&quot;_blank&quot;&gt;they also acquired Sentillion&lt;/a&gt;,
	which does IAM and single-sign on for healthcare companies. So although
	most of the big security companies don&#039;t say Microsoft is a competitor,
	it&#039;s always dangerous to disregard them. &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;The Happiness
	Genie &lt;/span&gt;- Very interesting &lt;a href=&quot;http://dilbert.com/blog/entry/the_happiness_genie/&quot; target=&quot;_blank&quot;&gt;thought experiment&lt;/a&gt; from Scott
	Adams on the Dilbert blog. Man, it must be a good gig to write comics
	because he seems to have plenty of time to think of weird scenarios and
	post them to his blog. The general idea is whether you would be happier
	if a happiness genie gave you $10 million, but a lot of folks you know
	would get $20 million. Or if you get (only) $5 million, but no one else
	gets anything. Hmmm. I&#039;d like to think $10 big is enough for me, even
	if my friends get double that. But if I&#039;m being honest, who knows? And
	that&#039;s really the key, be honest. The answer is OK, even if you are a
	greedy bastard that would be happier keeping their friends in a life of
	squalor. &lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
</description>
 <comments>http://securityincite.com/blog/mike-rothman/the-daily-incite-12-11-09-starbucks-seat-lottery#comments</comments>
 <category domain="http://securityincite.com/security-incite-rants/daily-incite">Daily Incite</category>
 <pubDate>Fri, 11 Dec 2009 10:19:56 -0600</pubDate>
 <dc:creator>Mike Rothman</dc:creator>
 <guid isPermaLink="false">1098 at http://securityincite.com</guid>
</item>
<item>
 <title>The Daily Incite - 12/09/09 - Plunger Tales</title>
 <link>http://securityincite.com/blog/mike-rothman/the-daily-incite-12-09-09-plunger-tales</link>
 <description>&lt;div style=&quot;text-align: center&quot; id=&quot;topcontent&quot;&gt;
&lt;img src=&quot;http://www.geronimollc.com/Geronimo/DailyInciteTopBanner2.jpg&quot; style=&quot;width: 448px; height: 107px&quot; alt=&quot;Today&#039;s Daily Incite&quot; /&gt;
&lt;/div&gt;
&lt;div style=&quot;font-size: 10pt; font-family: Arial&quot; id=&quot;leftcontent&quot;&gt;
&lt;h2&gt;December 9, 2009 - Volume 4, #37 &lt;/h2&gt;
Good Morning: &lt;br /&gt;
Like many of you, I&#039;ve got some friends that are pretty hardcore geeks.
They measure not just aggregate number of computers in their house, but
also the ratio of computers to people. Some are in the 1.5-2 range, and
others have embraced personal virtualization, so their ratio is off the
charts.&lt;br /&gt;
&lt;br /&gt;
But that isn&#039;t a relevant measure for me. I&#039;ve got my share of devices
and I&#039;ll be building a lab over the next few months, so my ratio will
dramatically &amp;quot;improve,&amp;quot; in the eyes of my geeky friends anyway. But I
was reading an interview with Tom Petty in Rolling Stone last night,
and he made a statement like &amp;quot;it&#039;s really was better back then.&amp;quot; &lt;br /&gt;
&lt;p&gt;
&lt;img src=&quot;http://www.pragmaticcso.com/Images/poopy-the-plunger.jpg&quot; style=&quot;border: 0px solid ; width: 168px; height: 240px; float: right&quot; alt=&quot;You thought your job was bad...&quot; vspace=&quot;10&quot; hspace=&quot;10&quot; /&gt;Now, to be clear, lots of
things are better today then they were. Connectivity, computing power,
content have all improved. One place where we&#039;ve taken a huge step back
in flushing power. That&#039;s right, I&#039;ve got angst this morning about the
current state of toilets. Don&#039;t laugh, this is a serious problem.&lt;br /&gt;
&lt;br /&gt;
You see, I eat a lot of roughage. Being a vegetarian, there isn&#039;t much
else for me to eat, but it&#039;s also good for my digestive system and
helps keep my mass in control. But there is a downside to all that
roughage. I don&#039;t just drop the kids off at the pool, I drop a
village. &lt;br /&gt;
&lt;br /&gt;
Today&#039;s low flow toilets are not built for guys like me, who are not
small and eat a mostly green diet. With a clog rate hovering around
75-80%, which means I need to have plungers. EVERYWHERE. I basically
have close to a 1.5x plunger to bathroom ratio in my house. Well, for
most clogs the mini-plunger will do and each bathroom is outfitted with
one as standard equipment. But sometimes you need specialized tools,
like the plunger with flanges. Or maybe the orange plastic one that
looks like an accordion. I&#039;ve also got 2 different snakes when plunging
doesn&#039;t get it done.&lt;br /&gt;
&lt;br /&gt;
Yet, sometimes even a toilet snake doesn&#039;t work. About once a year
(usually corresponding to one of the kids trying to &amp;quot;hide&amp;quot; an entire
roll of toilet paper in the toilet) I have to get out the heavy
artillery. I have a device that uses compressed air to pretty much blow
anything stuck in my toilet clear to the treatment plant. Now that is
cool, but I have to remember to wear my Intel bunny suit to keep
clean. 
&lt;/p&gt;
&lt;p&gt;
Thankfully my kids haven&#039;t figured out the meanest thing they
can do to me is to hide the plungers. And I&#039;m counting on all of you to
keep my secret. I guess that&#039;s kind of like my Kryponite.&lt;br /&gt;
&lt;br /&gt;
I think maybe the Europeans have this one right. They don&#039;t worry about
low or high flow. They just figure if it can be solved with a toilet
brush, it&#039;s not really a problem.
&lt;/p&gt;
Have a
great day, and may the force be with your alimentary canal. &lt;br /&gt;
&lt;p&gt;
&lt;br /&gt;
&lt;small&gt;Photo: &amp;quot;&lt;span style=&quot;font-style: italic&quot;&gt;Poopy
the Plunger&lt;/span&gt;&amp;quot; originally uploaded
by &lt;a href=&quot;http://www.flickr.com/photos/zoomar/2930603272/&quot; target=&quot;_blank&quot;&gt;zoomar&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;small&gt;Technorati: &lt;a href=&quot;http://technorati.com/tag/information%20security&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Information
Security&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;&lt;/small&gt;,&lt;small&gt;&lt;a href=&quot;http://www.technorati.com/tag/Security%20Mike&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Security
Mike&lt;/a&gt;, &lt;a href=&quot;http://www.technorati.com/tag/Internet%20Security&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Internet
Security&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;/p&gt;
&lt;table style=&quot;width: 481px; height: 276px; text-align: left; margin-left: auto; margin-right: auto&quot; border=&quot;0&quot; cellpadding=&quot;5&quot; cellspacing=&quot;2&quot;&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td style=&quot;text-align: center; width: 208px&quot;&gt;&lt;a href=&quot;http://www.pragmaticcso.com&quot;&gt;&lt;img src=&quot;http://www.pragmaticcso.com/Images/P-CSO-Cover-170w.jpg&quot; alt=&quot;The Pragmatic CSO&quot; style=&quot;border: 0px solid ; width: 170px; height: 259px&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;The
			Pragmatic CSO: &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Available Now! &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Read the Intro and
			Get &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&amp;quot;5 Tips to be a
			Better CSO&amp;quot;&lt;/span&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;a href=&quot;http://www.pragmaticcso.com/&quot; target=&quot;_blank&quot; style=&quot;font-weight: bold&quot;&gt;www.pragmaticcso.com&lt;/a&gt;&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;br /&gt;
			&lt;span style=&quot;font-family: Arial&quot;&gt;&lt;/span&gt;&lt;/td&gt;
			&lt;td style=&quot;text-align: center&quot;&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;big&gt;&lt;big&gt;&lt;big&gt;Follow
			me on Twitter:&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;/span&gt;&lt;a href=&quot;http://www.twitter.com/securityincite&quot; target=&quot;_blank&quot;&gt;@securityincite&lt;/a&gt;&lt;/big&gt;&lt;/big&gt;&lt;/big&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;img src=&quot;http://www.pragmaticcso.com/Images/twitter-logo.jpg&quot; style=&quot;width: 225px; height: 82px&quot; alt=&quot;Twitter&quot; /&gt;&lt;br /&gt;
			&lt;br /&gt;
			I&#039;m not sure where I&#039;m going, but I&#039;ll get there in 140 characters - or
			less...&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;
&lt;h1&gt;Incite 4 U&lt;/h1&gt;
&lt;br /&gt;
&lt;ol&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Cloud
	security is overblown&lt;/span&gt; - Sometimes I just have to laugh at
	some of the stuff I see in the trade rags. I dug this InformationWeek
	blog post from Alexander Wolfe out of the archives because after baring
	my soul about my plunger issues, I figured I needed to take someone
	else to task for a good dose of idiocy. This guy&#039;s position is that &lt;a href=&quot;http://www.informationweek.com/blog/main/archives/2009/11/encryption_is_c.html&quot; target=&quot;_blank&quot;&gt;cloud security may be overblown because we
	already have an answer - encryption&lt;/a&gt;. That&#039;s the answer to
	everything. We&#039;ve already got the architecture, and if we&#039;d just
	encrypt everything it doesn&#039;t matter where it resides, right? Uh huh. I
	guess Hoff needs to find something else to do now, since all the
	thinking he&#039;s been doing about cloud security isn&#039;t relevant. Having
	barely survived the PKI wars in the late 90&#039;s, I can&#039;t say much besides
	that encryption isn&#039;t a panacea to anything.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Next year&#039;s
	PCI emerges &lt;/span&gt;- Many in the security industry are looking
	for what&#039;s next. What&#039;s going to be the next attack, regulation,
	widget, etc to spur sales of products that no one needs. I think I
	found it, it&#039;s the HiTrust CSF. &lt;a href=&quot;http://searchsecuritychannel.techtarget.com/news/article/0,289142,sid97_gci1376195,00.html&quot; target=&quot;_blank&quot;&gt;Neil Roiter does a bit of work to describe
	the opportunity to security resellers&lt;/a&gt;. Now to be clear, the
	concept of a framework to protect healthcare information is valuable.
	I&#039;ve got no issue with that, but I&#039;m already playing out the fiesta
	driven by the industry parasites to make whatever widget they are
	selling today a &amp;quot;key&amp;quot; part of the HiTrust CSF. Of course, healthcare
	organizations will be able to be &amp;quot;certified&amp;quot; through a HiTrust
	certification program. Which will likely mean as much as PCI compliance
	or a SAS70 audit. But I guess I shouldn&#039;t complain, I&#039;m just another
	one of those parasites, feeding off the fat of the land, calling
	everyone else a parasite. &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Time to start
	looking for the BBD? &lt;/span&gt;- Over the past 18 months, many
	security folks have basically kept their head low and tried to make
	sure they weren&#039;t on the list to be downsized. But now with the economy
	(seemingly) improving, does that mean it&#039;s time to start looking for
	the bigger, better deal (BBD)? It depends. In this CSO article, Jack
	Phillips from IANS voices &lt;a href=&quot;http://www.csoonline.com/article/510013/Economic_Recovery_Will_Your_IT_Security_Department_Jump_Ship_&quot; target=&quot;_blank&quot;&gt;the concerns of large company CISOs that are
	worried their employees might look for greener pastures elsewhere&lt;/a&gt;.
	If you are staff level, I think how your company treated you during the
	downturn is instructive. If you felt abused and like a piece of meat, I
	suspect it won&#039;t get better during the upturn because that is a
	cultural issue. The words may change, but the behaviors likely won&#039;t.
	For managers, unfortunately now is the wrong time to try to make it
	right for team members. If you treated (or were forced to treat) your
	people like crap, blaming the economy and just letting it happen, you
	will reap what you have sown. When those employees find something
	better, don&#039;t wonder what happened. And build a culture where people
	want to work there, regardless of the economy.  &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Quant comes
	to the database&lt;/span&gt; - I&#039;m a fan of the work Rich and Adrian do
	in their &amp;quot;Project Quant&amp;quot; initiatives. Every security person struggles
	with understanding the relevant metrics to track both security and
	operational efficiency. So spending time to decompose the actual
	process behind a function and look to quantify those functions (by
	having folks in the community share their own data) is valuable. The
	Securosis guys started with &lt;a href=&quot;http://securosis.com/projectquant&quot; target=&quot;_blank&quot;&gt;the
	patch management&lt;/a&gt; front and are now focusing on database
	security. This post represents early work on &lt;a href=&quot;http://securosis.com/blog/project-quant-database-security-process-framework/&quot; target=&quot;_blank&quot;&gt;establishing the process model for database
	security&lt;/a&gt;. I suspect the goal is to build Quant models for all
	the major aspects of security, which will be a great thing for all of
	us that still can&#039;t answer the questions about whether we suck at
	security or not. At least from an operational perspective.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;How deep is
	the moat?&lt;/span&gt; - Many of us security talking heads spend a lot
	of time focusing on what&#039;s next. So things like application security
	and database security are big issues. Unfortunately most of the world
	is still trying to figure out how an IPS works. Far too many may have
	spent some time building a moat (in terms of a perimeter security
	strategy), but really have no idea whether it works and if they are
	protected from the badness &amp;quot;out there.&amp;quot; This piece by &lt;a href=&quot;http://searchmidmarketsecurity.techtarget.com/tip/0,289483,sid198_gci1373980,00.html&quot; target=&quot;_blank&quot;&gt;Joel Snyder on SearchSecurity reminds us
	about how and why to validate those perimeter defenses&lt;/a&gt;. Now
	to be clear, the cutting edge stuff represents real attack vectors and
	I&#039;m not minimizing the importance of those aspects. I&#039;m just reminding
	myself (and maybe all of you) that most organizations have no idea how
	to test their defenses, and they really need to learn.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Security and
	Business Strategy, huh?&lt;/span&gt; - I&#039;m constantly reminded that
	most security professionals still think it&#039;s about the bad guys. They
	are our foils and provide us with innovative attacks to keep us on our
	toes, but we always need to remember security is a means to an end, in
	that ultimately we have to contribute to helping the company either
	make money or save money. Here is a link to &lt;a href=&quot;http://www.networkworld.com/newsletters/sec/2009/112309sec1.html&quot; target=&quot;_blank&quot;&gt;Part 1 of an interview with SANS Stephen
	Northcutt talking about some of these issues&lt;/a&gt;. I also like to
	ask security folks whether they know their companies mission statement
	and how often they get face time with business leaders. For those that
	don&#039;t understand their business, they&#039;ve got a very small shot at being
	successful. &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Finding the
	impact of what we do &lt;/span&gt;- The always entertaining Shrdlu
	goes in a bit of a tirade here about the &lt;a href=&quot;http://layer8.itsecuritygeek.com/layer8/the-meaning-of-metrics/&quot; target=&quot;_blank&quot;&gt;&amp;quot;meaning of metrics&amp;quot;&lt;/a&gt; and before
	Thanksgiving did a far better job than I have to isolate the issues
	with how we count things. The reality is we tend to focus on things we
	do, not the IMPACT of what we do. I&#039;ve long held the belief that
	security folks have to really manage two sets of &amp;quot;metrics.&amp;quot; There are
	operational metrics that indicate how well we do security. And there
	are other metrics that need to quantify the real business impact
	(either positive or negative) of what we do. Business folks don&#039;t care
	about operational metrics, but they sure do care if they can&#039;t take
	orders because some hacker group has poked huge holes in the e-commerce
	application. Operational metrics should be reasonably consistent
	regardless of what business or size of company you are in. Impact
	metrics will be very specific to your company and depending on culture
	may or may not be consistent even within your vertical. For better or
	worse, the success of most CISOs is directly correlated to how well
	they understand the impact metrics. &lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
</description>
 <comments>http://securityincite.com/blog/mike-rothman/the-daily-incite-12-09-09-plunger-tales#comments</comments>
 <category domain="http://securityincite.com/security-incite-rants/daily-incite">Daily Incite</category>
 <pubDate>Wed, 09 Dec 2009 10:27:27 -0600</pubDate>
 <dc:creator>Mike Rothman</dc:creator>
 <guid isPermaLink="false">1097 at http://securityincite.com</guid>
</item>
<item>
 <title>The Daily Incite - 12/07/09 - Happy, Sad, Repeat</title>
 <link>http://securityincite.com/blog/mike-rothman/the-daily-incite-12-07-09-happy-sad-repeat</link>
 <description>&lt;div id=&quot;topcontent&quot; style=&quot;text-align: center&quot;&gt;
&lt;img src=&quot;http://www.geronimollc.com/Geronimo/DailyInciteTopBanner2.jpg&quot; alt=&quot;Today&#039;s Daily Incite&quot; style=&quot;width: 448px; height: 107px&quot; /&gt;
&lt;/div&gt;
&lt;div id=&quot;leftcontent&quot; style=&quot;font-size: 10pt; font-family: Arial&quot;&gt;
&lt;h2&gt;December 7, 2009 - Volume 4, #36 &lt;/h2&gt;
Good Morning {!firstname}: &lt;br /&gt;
Life is a roller coaster. Pure and simple. During a particularly
difficult time about 15 years ago, my Dad sent me &lt;a href=&quot;http://www.amazon.com/Seinlanguage-Jerry-Seinfeld/dp/0553569155&quot; target=&quot;_blank&quot;&gt;Seinfeld&#039;s book&lt;/a&gt;, with this
specific passage highlighted:&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;margin-left: 40px&quot;&gt;
&amp;quot;&lt;span style=&quot;font-style: italic&quot;&gt;Life is truly a ride. We&#039;re all
strapped in and no one can stop it. When the doctor slaps your behind,
he&#039;s ripping your ticket and away you go. As you make each passage from
youth to adulthood to maturity, sometimes you put your arms up and
scream, sometimes you just hang on to that bar in front of you. But the
ride is the thing. I think the most you can hope for at the end of life
is that your hair&#039;s messed, you&#039;re out of breath, and you didn&#039;t throw
up.&lt;/span&gt;&amp;quot;
&lt;/div&gt;
&lt;br /&gt;
It&#039;s hard to keep that in context during the day to day grind. One
minute you are up and
then in what seems like the next second you are down. It&#039;s also a bit
more challenging for security folks, because in general we tend to be
somewhat cynical (OK, very cynical) and borderline paranoid. It&#039;s take
me a long time to get in tune with my own peaks and troughs, and some
days that presents a pretty significant battle. &lt;br /&gt;
&lt;p&gt;
&lt;img src=&quot;http://www.pragmaticcso.com/Images/happy-sad.jpg&quot; alt=&quot;Happy? Sad? Yes, just wait a few minutes.&quot; style=&quot;border: 0px solid ; width: 240px; height: 152px; float: right&quot; hspace=&quot;10&quot; vspace=&quot;10&quot; /&gt;Take
yesterday, for example. I was excited to go see the hometown Falcons
play the Eagles. Yeah, I hate the Eagles. Growing up in NY and being a
Giants fan means you pretty much hate the Eagles. I know hate is a
strong word, but actually it may not be strong enough. I hate^2 the
Eagles, so I was hoping the dirty birds would put a hurting on visitors.&lt;br /&gt;
&lt;br /&gt;
Of course, my optimism lasted about 10 minutes and the reality of the
impact of having 40% of the offense inactive set in. It was ugly, and
totally compounded by the number of Eagles fans there to gloat. OK,
they didn&#039;t gloat, they were pretty cool (especially for Eagles fans),
but still. It hurt, and I was grumpy.&lt;br /&gt;
&lt;br /&gt;
So I get back to Chez Incite and settle in to watch the Giants play the
hated^2 Cowboys. Things started slowly for the G-men, and my mood was
descending into dark places. The Boss was going to vacate the premises,
but then at the end of the first half the Giants got going and held on
for the victory. Elation personified. I&#039;m not sure why football gets me
so fired up, but it does. And given how the Giants have played over the
past two months, getting a big win was awesome. &lt;br /&gt;
&lt;br /&gt;
But then I need to take a step back. There were pretty low lows and
pretty high highs all in the course of about 6 hours. And this was
about football, not anything really important. I think part of finding
balance and happiness is to acknowledge that there are some things that
you CHOOSE to get excited about. That means you also need to accept
that those very things will make you miserable at times. &lt;br /&gt;
&lt;br /&gt;
Then the misery will pass. Just as the happiness will pass. This is the
cycle we call life. Some can&#039;t deal with it and think there is
something wrong with them because they get whiplash swinging back and
forth between pessimism and optimism. There is nothing wrong with that.
There is nothing wrong with them. It&#039;s called being human.
&lt;/p&gt;
Have a
great day. &lt;br /&gt;
&lt;p&gt;
&lt;br /&gt;
&lt;small&gt;Photo: &amp;quot;&lt;span style=&quot;font-style: italic&quot;&gt;Ms.
Happy, meet Mr. Sad 111/365&lt;/span&gt;&amp;quot; originally uploaded
by &lt;a href=&quot;http://www.flickr.com/photos/sashawolff/3388736912/&quot; target=&quot;_blank&quot;&gt;SashaW&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;small&gt;Technorati: &lt;a href=&quot;http://technorati.com/tag/information%20security&quot; rel=&quot;tag&quot; target=&quot;_blank&quot;&gt;Information
Security&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;&lt;/small&gt;,&lt;small&gt;&lt;a href=&quot;http://www.technorati.com/tag/Security%20Mike&quot; rel=&quot;tag&quot; target=&quot;_blank&quot;&gt;Security
Mike&lt;/a&gt;, &lt;a href=&quot;http://www.technorati.com/tag/Internet%20Security&quot; rel=&quot;tag&quot; target=&quot;_blank&quot;&gt;Internet
Security&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;/p&gt;
&lt;table style=&quot;width: 481px; height: 276px; text-align: left; margin-left: auto; margin-right: auto&quot; border=&quot;0&quot; cellpadding=&quot;5&quot; cellspacing=&quot;2&quot;&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td style=&quot;text-align: center; width: 208px&quot;&gt;&lt;a href=&quot;http://www.pragmaticcso.com&quot;&gt;&lt;img src=&quot;http://www.pragmaticcso.com/Images/P-CSO-Cover-170w.jpg&quot; style=&quot;border: 0px solid ; width: 170px; height: 259px&quot; alt=&quot;The Pragmatic CSO&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;The
			Pragmatic CSO: &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Available Now! &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Read the Intro and
			Get &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&amp;quot;5 Tips to be a
			Better CSO&amp;quot;&lt;/span&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;a href=&quot;http://www.pragmaticcso.com/&quot; style=&quot;font-weight: bold&quot; target=&quot;_blank&quot;&gt;www.pragmaticcso.com&lt;/a&gt;&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;br /&gt;
			&lt;span style=&quot;font-family: Arial&quot;&gt;&lt;/span&gt;&lt;/td&gt;
			&lt;td style=&quot;text-align: center&quot;&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;big&gt;&lt;big&gt;&lt;big&gt;Follow
			me on Twitter:&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;/span&gt;&lt;a href=&quot;http://www.twitter.com/securityincite&quot; target=&quot;_blank&quot;&gt;@securityincite&lt;/a&gt;&lt;/big&gt;&lt;/big&gt;&lt;/big&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;img src=&quot;http://www.pragmaticcso.com/Images/twitter-logo.jpg&quot; alt=&quot;Twitter&quot; style=&quot;width: 225px; height: 82px&quot; /&gt;&lt;br /&gt;
			&lt;br /&gt;
			I&#039;m not sure where I&#039;m going, but I&#039;ll get there in 140 characters - or
			less...&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;
&lt;h1&gt;Incite 4 U&lt;/h1&gt;
&lt;ol&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Liberation
	and Thought Leadership&lt;/span&gt; - RockyD rocks the house on FUDSEC
	last week with &lt;a href=&quot;http://fudsec.com/liberate-yourself-change-the-game-to-suit-you&quot; target=&quot;_blank&quot;&gt;a
	post about getting out of the rut many of us are in&lt;/a&gt;.
	There is a lot of good stuff in here (especially about focusing on
	R&amp;amp;D and better information sharing) and like most of the FUDSEC
	posts, it&#039;s about spurring discussion. &lt;a href=&quot;http://securosis.com/blog/changing-the-game&quot; target=&quot;_blank&quot;&gt;Mort
	takes issues with some of the stuff on the Securosis blog&lt;/a&gt;,
	and I agree with his positions, so I&#039;m not going to rehash. What I&#039;m
	going to pick on is the part where Rocky advocates a &amp;quot;vendor thought
	leadership&amp;quot; approach to the more strategic problem set. Sorry dude,
	it&#039;s not going to happen. Unless you count having every vendor (or
	consultant) apply what&#039;s in their bag and position it as a &amp;quot;strategic&amp;quot;
	solution. The profit motive ensures that the job of the vendor (and in
	many cases, consultant) is to convince the customer the strategic
	problem-set is addressed by the products. I know you are advocating the
	exact opposite approach, but I can&#039;t see it happening because a
	quarterly mind-set ensures short cuts are taken at every opportunity.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Noise level
	at an all-time high &lt;/span&gt;- The results of the annual CSI
	survey are out. &lt;a href=&quot;http://www.net-security.org/secworld.php?id=8568&quot; target=&quot;_blank&quot;&gt;The
	Help-Net Security folks did a nice job summarizing the findings&lt;/a&gt;.
	Basically we are dealing with a lot more incidents, but the average
	loss per incident is coming down. Hmmm. That wouldn&#039;t have to do with
	the fact that losses are not growing as fast as the number of
	incidents, eh? But the point is this is all noise. These surveys are
	interesting to look at in five year cycles to see where we&#039;ve been, but
	not very instructive to understand where we are going. Fact is, we need
	to focus on blocking and tackling - STILL. And given that cyber-crime
	is a growth market, I don&#039;t expect these surveys to show anything
	remarkably different for years to come. The point is for you to not end
	up as one of the statistics. &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;More noise
	about data breaches &lt;/span&gt;- The folks at Imperva were also kind
	enough to point out the fact that &lt;a href=&quot;http://blog.imperva.com/2009/11/2009-the-year-of-the-mega-security-breach.html&quot; target=&quot;_blank&quot;&gt;even
	though the number of reported data breaches is going down, the number
	of records compromised has exponentially increased&lt;/a&gt;.
	Which again is predictable. With some exceptions, the amount of work to
	steal a million identities is similar to stealing 50 million. So why
	wouldn&#039;t the bad guys go after bigger targets? And they have -
	successfully. Good for them. The point is the noise can be used for FUD
	purposes (yes, there is a time and place for fear, uncertainty, and
	doubt in every security practitioners bag), but it shouldn&#039;t be
	impacting our plans, strategies or processes AT ALL. Incidents and
	breaches happen, we know that. Blocking and tackling will help make
	sure you aren&#039;t low hanging fruit - but you will still likely be pwned.
	Then it&#039;s about making sure your incident response plan is where it
	needs to be. &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Santa in camo
	comes early for ARST&lt;/span&gt; - ArcSight announced their fiscal 2Q
	results last week, and the numbers were good. Here is &lt;a href=&quot;http://www.arcsight.com/press/release/earningsreport-Q2FY2010/&quot; target=&quot;_blank&quot;&gt;the
	release&lt;/a&gt; and &lt;a href=&quot;http://seekingalpha.com/article/176485-arcsight-inc-f2q10-qtr-end-31-10-09-earnings-call-transcript&quot; target=&quot;_blank&quot;&gt;the
	earnings call transcript&lt;/a&gt;.
	39% year of year growth and another quarter of strong cash flow. Lots
	of activity in the federal space, which is expected - given the focus
	on cyber-X that most of the defense and civilian agencies have. In
	fact, government revenues accounted for 49% of their quarter. As the
	federal markets figure out which end is up for FY 2010, it&#039;ll be
	interesting to see if/how the commercial markets continue to adopt
	security management technology. Given compliance mandates, everyone
	needs it - but there are cheap ways to check the box and there are
	expensive ways to overhaul operations. Which path commercial
	organizations take is still an open question (in my mind anyway).&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Rebranding
	SIEM&lt;/span&gt; - Speaking of SIEM, Independent Anton (did you check
	out his &lt;a href=&quot;http://www.securitywarriorconsulting.com/&quot; target=&quot;_blank&quot;&gt;new consulting site&lt;/a&gt;?) has &lt;a href=&quot;http://chuvakin.blogspot.com/2009/11/on-siem-complexity.html&quot; target=&quot;_blank&quot;&gt;an interesting analysis of the SIEM market&lt;/a&gt;,
	bringing in some Ries marketing mojo and really trying to tackle the
	issue of perception vs. reality. Given that I know a thing or two about
	how to (or more likely, how NOT to) market a SIEM platform, the reality
	is that SIEM is not a must-have. I know about 10 vendors that will be
	jumping up and down telling me I&#039;m wrong. But they are missing the
	point. Compliance is a must have, and that means some of the aspects of
	most modern SIEMs (like log management) must be highlighted because
	that&#039;s where the funding is. Once the funding is found, then it&#039;s about
	highlighting difference - such as with capabilities like SIEM or NBA or
	configuration audit. Anton is right that the focus must be on solving
	problems, not on flashing lights or even scalability. Until a customer
	is convinced a SIEM can solve a problem, how fast it is (or how many
	other capabilities it has) is really besides the point.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Andreas&#039; love
	note to 2009&lt;/span&gt; - The analyst I now dub &amp;quot;Double A&amp;quot; for
	Andreas Antonopoulos does a little &lt;a href=&quot;http://www.networkworld.com/columnists/2009/120109antonopoulos.html&quot; target=&quot;_blank&quot;&gt;revisiting of his 2009 predictions in one of
	his last NetworkWorld columns for 2009&lt;/a&gt;. As you can see, there
	wasn&#039;t anything too controversial here and for the most part he was
	right. It turns out that if you keep your head off the chopping block,
	it usually is still attached at the end of the year. I&#039;d take some
	issue with his &amp;quot;correct&amp;quot; prediction about mobile security, given the
	iPhone worm was only applicable to those with jail broken phones, but
	it&#039;s good to see someone holding themselves accountable for the things
	said. Perhaps Big Research will get into the act as well (0%
	probability).&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Cloud-based
	security services unite &lt;/span&gt;- I loved the &lt;a href=&quot;http://en.wikipedia.org/wiki/Wonder_Twins&quot; target=&quot;_blank&quot;&gt;Wonder
	Twins&lt;/a&gt; cartoon when I was growing up. And when I saw
	this announcement about &lt;a href=&quot;http://www.channelinsider.com/c/a/Security/RSA-Leverages-TrendMicro-Technology-in-New-Deal-421511/&quot; target=&quot;_blank&quot;&gt;RSA leveraging some of Trend Micro&#039;s threat
	intelligence in their own fraud detection services&lt;/a&gt;, the
	Wonder Twins popped into my head. The reality is this kind of
	information sharing is a good thing. Will it make a difference? Who
	knows, but it makes for good marketing since when trying to
	differentiate &amp;quot;cloud intelligence&amp;quot; it&#039;s all about how much data you
	have. What you use, on the other hand, is very likely a different
	story. Obviously Art (playing the role of Zan) transforms into a cloud.
	But what about Eva (playing Jayna)? What animal form makes the most
	sense for her? Leave your thoughts in the comments... &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Pretty good
	rules to live by&lt;/span&gt; - It&#039;s great to see other folks sharing
	their own life philosophies, and I&#039;ll point the interesting one&#039;s out
	as appropriate. I want to give Michael Dahn some props on &lt;a href=&quot;http://chaordicmind.com/blog/2009/11/23/3-rules-to-live-by/&quot; target=&quot;_blank&quot;&gt;a set of three &amp;quot;rules&amp;quot; that he lives by&lt;/a&gt;,
	that I think are applicable to most of us. The first is &amp;quot;nothing is
	impossible, the impossible just takes longer.&amp;quot; Perseverance is a key to
	success, check. &amp;quot;Learn the good, avoid the bad&amp;quot; seems obvious, but is
	VERY hard to actually do. I&#039;ve found that most folks have to learn the
	hard way what is good and what is bad. It&#039;s a rare bird that can
	actually learn from someone else&#039;s pain. And finally &amp;quot;never stop
	improving&amp;quot; which is actually a double edged sword. One of my problems
	is that I am never satisfied and that creates some real issues in
	knowing how good you need to be in any aspect of anything.&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
</description>
 <comments>http://securityincite.com/blog/mike-rothman/the-daily-incite-12-07-09-happy-sad-repeat#comments</comments>
 <category domain="http://securityincite.com/security-incite-rants/daily-incite">Daily Incite</category>
 <pubDate>Mon, 07 Dec 2009 10:44:44 -0600</pubDate>
 <dc:creator>Mike Rothman</dc:creator>
 <guid isPermaLink="false">1096 at http://securityincite.com</guid>
</item>
<item>
 <title>The Daily Incite - 12/03/09 - Not so GRRRRREEEEAAAAATTTTT!!!!</title>
 <link>http://securityincite.com/blog/mike-rothman/the-daily-incite-12-03-09-not-so-grrrrreeeeaaaaattttt</link>
 <description>&lt;div style=&quot;text-align: center&quot; id=&quot;topcontent&quot;&gt;
&lt;img src=&quot;http://www.geronimollc.com/Geronimo/DailyInciteTopBanner2.jpg&quot; style=&quot;width: 448px; height: 107px&quot; alt=&quot;Today&#039;s Daily Incite&quot; /&gt;
&lt;/div&gt;
&lt;div style=&quot;font-size: 10pt; font-family: Arial&quot; id=&quot;leftcontent&quot;&gt;
&lt;h2&gt;December 3, 2009 - Volume 4, #35 &lt;/h2&gt;
Good Morning: &lt;br /&gt;
With the holiday season coming up, I know it&#039;s hard to get presents for
me. I want for nothing and if I do want something, more often than not
I just go and buy it. Within reason, of course. So I know it&#039;s a
challenge for folks in my family to get me anything. But I can only
imagine how hard it is to buy a present for a guy like Tiger Woods. &lt;br /&gt;
&lt;p&gt;
&lt;img src=&quot;http://www.pragmaticcso.com/Images/sad-tiger.jpg&quot; alt=&quot;Yeah I&#039;m sad, the model is taking half my stuff...&quot; style=&quot;border: 0px solid ; width: 240px; height: 180px; float: right&quot; hspace=&quot;10&quot; vspace=&quot;10&quot; /&gt;Yes, that Tiger Woods. The
one who makes over a hundred million a year. And who married the
Swedish model. If you were to ask almost everyone, if they could pick a
perfect life - I&#039;d say most would say Tiger&#039;s got it pretty good.&lt;br /&gt;
&lt;br /&gt;
Evidently not. I was pretty disturbed when the news of his
&amp;quot;transgressions&amp;quot; hit the major media yesterday. First of all, this
story has outweighed little issues like sending 30,000 more troops to
Afghanistan over the past week. But I shouldn&#039;t be surprised. Our
celebrity-centric US media engine means they&#039;ll sell a lot more page
views by talking about Tiger&#039;s dick than the tens of thousands now in
harm&#039;s way. Got to let that one go.&lt;br /&gt;
&lt;br /&gt;
At least Tiger didn&#039;t pull a &lt;a href=&quot;http://deadspin.com/5389689/steve-phillips-fired-by-espn-updated&quot; target=&quot;_blank&quot;&gt;Steve Phillips&lt;/a&gt;. The stripper or
whatever is pretty decent looking. But still, he married a SWEDISH
MODEL. Really seriously I just don&#039;t get it. Is this guy&#039;s life so good
that he has to go and screw it up because he can? Because a dream for
99.999999% of the population has just become commonplace. Please, help
me understand it.&lt;br /&gt;
&lt;br /&gt;
Is it the need to exercise power? Is it the feeling of being
invincible? I guess all the psychologists out there are having a field
day trying to figure it out. I guess now that I&#039;m writing, I&#039;m just
sad. Sad that what seems like the perfect life I guess isn&#039;t so
perfect. Sad that this guy has to face his failings in such a public
way. But ultimately sad that once again, human nature has trumped any
sense of logic. &lt;br /&gt;
&lt;br /&gt;
That old adage about money doesn&#039;t buy happiness, I guess is true. It
seems a Swedish model doesn&#039;t make you happy either. I guess for Tiger
being the best golfer ever is not enough. Having untold riches is not
enough. Having a beautiful family isn&#039;t enough either. After all, in
Tiger-land I guess things aren&#039;t really that
GRRRRREEEEEAAAATTTTT!!!!. 
&lt;/p&gt;
Have a
great weekend. &lt;br /&gt;
&lt;p&gt;
&lt;br /&gt;
&lt;small&gt;Photo: &amp;quot;&lt;span style=&quot;font-style: italic&quot;&gt;The
world&#039;s saddest tiger, part deux&lt;/span&gt;&amp;quot; originally uploaded
by &lt;a href=&quot;http://www.flickr.com/photos/sin_agua/469180512/&quot; target=&quot;_blank&quot;&gt;peppergrasss&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;small&gt;Technorati: &lt;a href=&quot;http://technorati.com/tag/information%20security&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Information
Security&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;&lt;/small&gt;,
&lt;small&gt;&lt;a href=&quot;http://www.technorati.com/tag/Security%20Mike&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Security
Mike&lt;/a&gt;, &lt;a href=&quot;http://www.technorati.com/tag/Internet%20Security&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Internet
Security&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;/p&gt;
&lt;table style=&quot;width: 481px; height: 276px; text-align: left; margin-left: auto; margin-right: auto&quot; border=&quot;0&quot; cellpadding=&quot;5&quot; cellspacing=&quot;2&quot;&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td style=&quot;text-align: center; width: 208px&quot;&gt;&lt;a href=&quot;http://www.pragmaticcso.com&quot;&gt;&lt;img src=&quot;http://www.pragmaticcso.com/Images/P-CSO-Cover-170w.jpg&quot; alt=&quot;The Pragmatic CSO&quot; style=&quot;border: 0px solid ; width: 170px; height: 259px&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;The
			Pragmatic CSO: &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Available Now! &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Read the Intro and
			Get &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&amp;quot;5 Tips to be a
			Better CSO&amp;quot;&lt;/span&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;a href=&quot;http://www.pragmaticcso.com/&quot; target=&quot;_blank&quot; style=&quot;font-weight: bold&quot;&gt;www.pragmaticcso.com&lt;/a&gt;&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;br /&gt;
			&lt;span style=&quot;font-family: Arial&quot;&gt;&lt;/span&gt;&lt;/td&gt;
			&lt;td style=&quot;text-align: center&quot;&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;big&gt;&lt;big&gt;&lt;big&gt;Follow
			me on Twitter:&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;/span&gt;&lt;a href=&quot;http://www.twitter.com/securityincite&quot; target=&quot;_blank&quot;&gt;@securityincite&lt;/a&gt;&lt;/big&gt;&lt;/big&gt;&lt;/big&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;img src=&quot;http://www.pragmaticcso.com/Images/twitter-logo.jpg&quot; style=&quot;width: 225px; height: 82px&quot; alt=&quot;Twitter&quot; /&gt;&lt;br /&gt;
			&lt;br /&gt;
			I&#039;m not sure where I&#039;m going, but I&#039;ll get there in 140 characters - or
			less...&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.pragmaticcso.com/&quot; target=&quot;_blank&quot; style=&quot;font-weight: bold&quot;&gt;&lt;/a&gt;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;
&lt;h1&gt;Incite 4 U&lt;/h1&gt;
It&#039;s nice to be flexing the analytical muscles again. I can say I&#039;ve
gotten a bit soft over the past 15 months. But like all muscle memory,
the cynicism, skepticism, and general venom will be back before you
know it. &lt;a href=&quot;http://www.ashimmy.com/2009/12/the-alan-and-mitchell-podcast-who-is-that-masked-man-mike-rothman.html&quot; target=&quot;_blank&quot;&gt;Alan and Mitchell invited me to participate
in their podcast yesterday&lt;/a&gt;, which was great fun. We laughed,
we cried, we made fun of people, but mostly we laughed. Enjoy.&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;It&#039;s not just
	a job, it&#039;s an adventure&lt;/span&gt; - Happiness is a fleeting
	concept. It&#039;s here for a few minutes, then it&#039;s gone, then it&#039;s back.
	Hopefully it&#039;s not gone for too long. I wanted to send a shout out to &lt;a href=&quot;http://www.andyitguy.com/blog/?p=819&quot; target=&quot;_blank&quot;&gt;AndyITGuy
	for doing some good analysis of where his head was at&lt;/a&gt; after
	he got laid off recently. It was a heartfelt and candid post. We all
	have days where we feel like that. The reality is security is a hard
	job - on a good day. And if we are going to find any measure of
	happiness, you have to be able to understand you can do only what you
	can do. Sometimes you just need to move on, especially if the
	organization isn&#039;t going to give you the opportunity to be successful.
	But many of us thrive on challenge and don&#039;t believe anything is
	impossible. That&#039;s why you do security.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;If you aren&#039;t
	breaking your stuff... &lt;/span&gt;- Someone else is. That&#039;s right,
	it seems driven by the recent &lt;a href=&quot;http://www.rapid7.com/news-events/press-releases/2009/2009-rapid7-acquire-metasploit.jsp&quot; target=&quot;_blank&quot;&gt;Rapid7/Metasploit deal&lt;/a&gt;, pen
	testing software is back in the spotlight. The folks over at &lt;a href=&quot;http://www.darkreading.com/security/vulnerabilities/showArticle.jhtml?articleID=221900215&amp;amp;cid=ref-true&quot; target=&quot;_blank&quot;&gt;Dark Reading did an analysis of the market&lt;/a&gt;,
	and &lt;a href=&quot;http://threatpost.com/en_us/blogs/penetration-testing-marketplace-2010-120109&quot; target=&quot;_blank&quot;&gt;Nick Selby also weighed in on what he
	expects in that market&lt;/a&gt; over the next year. I&#039;m glad folks are
	starting to see the importance of what I call &amp;quot;security assurance.&amp;quot; If
	you are a company of size, you should have someone on your staff
	breaking things every day. And they should be using live ammo. Vuln
	scanners are important too (if only to see the depth of your issues),
	you really need to take it to the next level and see what can really be
	exploited. It&#039;s also good to see higher level application attacks
	starting to show up in the app scanners as well. &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Ramping up
	the &amp;quot;cyberwar&amp;quot; hype cycle &lt;/span&gt;- Here is the reality:
	technology is an intrinsic part of everything today. Why do I need to
	state some an obvious truism? Because folks continue to want to
	convince us that there is something new here. Take &lt;a href=&quot;http://siblog.mcafee.com/?p=1494&quot; target=&quot;_blank&quot;&gt;McAfee,
	for instance - they recently did a report on &amp;quot;cyberwar,&amp;quot;&lt;/a&gt;
	making the point that an increasing number of attacks seem politically
	motivated. And what&#039;s new about that? If you want to sabotage a
	competitor, why not break into their systems? Or rob a bank? Or bring
	down critical infrastructure? Or get intel on an enemy&#039;s defenses? Of
	course, a technology attack is the first, best path. You only bring in
	the Black Ops guys when you really need to. I&#039;m not challenging the
	findings, I&#039;m just wonder why this is news? &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;SMBs like SaaS&lt;/span&gt;
	- Directly from the Duh! files, the folks at &lt;a href=&quot;http://www.darkreading.com/securityservices/security/perimeter/showArticle.jhtml?articleID=221600951&quot; target=&quot;_blank&quot;&gt;Dark Reading are hyping a report they wrote
	about how SMB organizations should be protecting their stuff&lt;/a&gt;.
	One of the conclusions is that Security as a Service (SaaS) is an
	attractive alternative. Really? And then they start throwing the
	numbers out. $38K for a web gateway software vs. $15K for a managed
	service. If you know how to use Excel, you can make the numbers say
	anything you want. But the reality is not really about cost savings,
	it&#039;s about expertise and leverage. A lot of these security devices need
	daily tuning, care and feeding and that just doesn&#039;t work for an
	overworked IT guy in a smaller company. So to me the interesting part
	of SaaS isn&#039;t how much money you can save, which may or may not
	materialize. It&#039;s the leverage that can be gained by having someone
	else manage the crap you don&#039;t have time to manage.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;If Big J says
	I&#039;m doing it wrong...&lt;/span&gt; - We are still very early in the
	evolution of application security, and that means we are still
	subjected to religious battles like white box vs. black box testing.
	Thankfully &lt;a href=&quot;http://www.darkreading.com/securityservices/security/perimeter/showArticle.jhtml?articleID=221600951&quot; target=&quot;_blank&quot;&gt;Jeremiah Grossman provides some much needed
	perspective here&lt;/a&gt;, in terms of making the point that BOTH is
	the right answer. There are some things that code review are better at
	finding, and you cannot minimize the need to automate using scanners
	and other tools. As with everything else in security, there is no one
	silver bullet for application security. It&#039;s about minimizing the risk
	that you&#039;ve missed something and using every tool, technique and
	process at your disposal is just the right thing to do.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Whitelisting
	good&lt;/span&gt; - Normally reviews don&#039;t interest me that much,
	unless it&#039;s really indicative of a changing market. So this piece by
	Roger Grimes for XWorld (all the IDG properties seem to share
	content now) &lt;a href=&quot;http://www.networkworld.com/reviews/2009/110409-infoworld-review-whitelisting-security-comes.html&quot; target=&quot;_blank&quot;&gt;testing a bunch of white listing products&lt;/a&gt;
	is really indicative a market that is mature enough to disappear. Huh?
	That&#039;s right, once a large set of products actually work and solve the
	problem, then the capabilities can and should be subsumed into a bigger
	category and that&#039;s exactly what is happening. First of all, I&#039;m a big
	believer in white listing. The old way to find malware (checking
	against signatures) isn&#039;t getting it done. And over time, we&#039;ll see all
	of the big AV vendors move to a hybrid &amp;quot;cloud&amp;quot; (meaning the extended
	sig database is in the cloud) and white list driven approach. And it
	still won&#039;t work, but that&#039;s another story for another day.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Think dummy,
	think&lt;/span&gt;
	- &lt;a href=&quot;http://newschoolsecurity.com/2009/10/new-best-practice-think/&quot; target=&quot;_blank&quot;&gt;Adam says it all&lt;/a&gt;. We don&#039;t do
	enough of this. &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Damage
	control, the 30,000 foot view&lt;/span&gt; - Sometimes I like to check
	out &amp;quot;security tips&amp;quot; targeted towards a mass market audience to see how
	closely some of this stuff maps to reality. The good news from this
	post on &lt;a href=&quot;http://entrepreneur.venturebeat.com/2009/11/25/youve-been-hacked-now-what/&quot; target=&quot;_blank&quot;&gt;how to respond to an incident from
	VentureBeat&lt;/a&gt; is pretty good. To be clear, it&#039;s VERY high
	level, but for this audience that&#039;s fine. They don&#039;t want to hear about
	chain of custody, enCase or BackTrack. They need to understand the
	general process, not the details. The very high priced forensic guys
	can worry about the details. But as I&#039;ve said countless times, it&#039;s not
	about being perfect (you can&#039;t), it&#039;s about making sure an incident
	doesn&#039;t become a catastrophe.&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
</description>
 <comments>http://securityincite.com/blog/mike-rothman/the-daily-incite-12-03-09-not-so-grrrrreeeeaaaaattttt#comments</comments>
 <category domain="http://securityincite.com/security-incite-rants/daily-incite">Daily Incite</category>
 <pubDate>Thu, 03 Dec 2009 08:30:04 -0600</pubDate>
 <dc:creator>Mike Rothman</dc:creator>
 <guid isPermaLink="false">1095 at http://securityincite.com</guid>
</item>
<item>
 <title>The Daily Incite - 11/30/09 - Giving Thanks</title>
 <link>http://securityincite.com/blog/mike-rothman/the-daily-incite-11-30-09-giving-thanks</link>
 <description>&lt;div id=&quot;topcontent&quot; style=&quot;text-align: center&quot;&gt;
&lt;img src=&quot;http://www.geronimollc.com/Geronimo/DailyInciteTopBanner2.jpg&quot; alt=&quot;Today&#039;s Daily Incite&quot; style=&quot;width: 448px; height: 107px&quot; /&gt;
&lt;/div&gt;
&lt;div id=&quot;leftcontent&quot; style=&quot;font-size: 10pt; font-family: Arial&quot;&gt;
&lt;h2&gt;November 30, 2009 - Volume 4, #34 &lt;/h2&gt;
Good Morning: &lt;br /&gt;
Oh yeah. I&#039;m back and it feels great. Just getting done with the long
holiday weekend here in the States got me thinking about how thankful I
am. So I&#039;m going to go through the list in an &amp;quot;Inciteful&amp;quot; way. Then
it&#039;s back to some pithy and totally subjective opinion of some recent
security stuff. IN MY VOICE. The past 15 months I&#039;ve had to speak
(again) in someone else&#039;s voice and well... that ain&#039;t me. So it&#039;s nice
to exercise the sonorous baritone a bit and though I&#039;m no Barry White,
the voice is definitely mine. &lt;br /&gt;
&lt;p&gt;
&lt;img src=&quot;http://www.pragmaticcso.com/Images/Give-Thanks.jpg&quot; style=&quot;border: 0px solid ; width: 240px; height: 180px; float: right&quot; alt=&quot;I&#039;m thankful the aliens didn&#039;t obliterate me this weekend.&quot; vspace=&quot;10&quot; hspace=&quot;10&quot; /&gt;First and foremost, I&#039;m
thankful for The Boss. Yes, she is still my boss and no one provides
more support for what I do than my wife. She was the first one to
suggest that I really needed to get back to Incite and that it&#039;s the
thing that makes me happiest. She&#039;s ridden shotgun through the highs
and lows and back again. And hardly puked on my shoes through the
turbulence.&lt;br /&gt;
&lt;br /&gt;
Next up are my kids and family. The kids provide a ton of entertainment
on a daily basis. When I&#039;m not gnashing my teeth that is. But I need to
continue working on my patience and there is no better way to do that
than to have 3 kids running around. My family is well...my family. Yes,
I love them. Yes, at times they make me crazy. And yes, I need to
accept them and their idiosyncrasies. Just as they accept me and my
nuttiness.&lt;br /&gt;
&lt;br /&gt;
I&#039;m thankful for all of the friends I&#039;ve made in the industry. Many of
which wrote to tell me how sorry they were I got laid off. It&#039;s great
to have so many folks that &amp;quot;have my back,&amp;quot; and are supportive of what I
do. Of course, I&#039;m not sorry about the way things worked out and I
couldn&#039;t be more excited to be blazing my own trail again. But for
every one of you that Tweeted or emailed or called, thank you. Really
really thank you.&lt;br /&gt;
&lt;br /&gt;
I&#039;m thankful for the folks that have better things to do than secure
their stuff. For one, a small percentage of them will be statistics
which allow the vendors to keep spewing FUD at an unbelievable pace.
That FUD keeps guys like me busy. I&#039;m also thankful that these folks
need a much more Pragmatic way to think about securing their stuff.
They don&#039;t care about being &amp;quot;secure,&amp;quot; they want to make the auditor go
away and they don&#039;t want to get pwned. Of course, we all know those
objectives are at odds with each other, but that evangelization process
is what I love, so I don&#039;t want to change a thing. &lt;br /&gt;
&lt;br /&gt;
I&#039;m thankful for Big Research. They continue to well be Big, and that
means pretty much lumbering around in their fat, dumb and lazy way.
Using the same presentations year in and year out, and being a great
backwards looking indicator. There are some great analysts in Big
Research land, and I&#039;m happy to call many of them my friends. There are
also a whole lot of not so great analysts, and that creates opportunity
for guys like me. But ultimately these are the folks that invented the
IT research industry and I continue to ride their coat tails on a daily
basis. 
&lt;/p&gt;
&lt;p&gt;
I&#039;m thankful for every single one of you that clicks on an
email or opens up their RSS reader or even visits my web site to read
what I write. Like everyone who gets a second (or third or fourth)
chance, you appreciate it much more after it&#039;s been taken for a while.&lt;br /&gt;
&lt;/p&gt;
Finally, I&#039;m thankful for my time at eIQ. Every so often, a guy like me
needs to be reminded that the grass is not greener on the other side.
Statistically, you are probably as likely to win the lottery as you are
to pick the right hot start-up and make a bunch of money. Ultimately
the material spoils don&#039;t matter if you don&#039;t enjoy what you are doing.
Especially when you can make a decent living doing what you like. So my
latest trip back into corporate America reminded me of what I seem to
have forgotten. That I need to be thankful for doing what I like, and
that I should just do it. Which is what I plan to do.&lt;br /&gt;
&lt;br /&gt;
Have a
great day. &lt;br /&gt;
&lt;p&gt;
&lt;br /&gt;
&lt;small&gt;Photo: &amp;quot;&lt;span style=&quot;font-style: italic&quot;&gt;Give
Thanks&lt;/span&gt;&amp;quot; originally uploaded by &lt;a href=&quot;http://www.flickr.com/photos/subcess/3181373271/&quot; target=&quot;_blank&quot;&gt;Markus Rodder&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;small&gt;Technorati: &lt;a href=&quot;http://technorati.com/tag/information%20security&quot; rel=&quot;tag&quot; target=&quot;_blank&quot;&gt;Information
Security&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;&lt;/small&gt;,
&lt;small&gt;&lt;a href=&quot;http://www.technorati.com/tag/Security%20Mike&quot; rel=&quot;tag&quot; target=&quot;_blank&quot;&gt;Security
Mike&lt;/a&gt;, &lt;a href=&quot;http://www.technorati.com/tag/Internet%20Security&quot; rel=&quot;tag&quot; target=&quot;_blank&quot;&gt;Internet
Security&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;/p&gt;
&lt;table style=&quot;width: 481px; height: 276px; text-align: left; margin-left: auto; margin-right: auto&quot; border=&quot;0&quot; cellpadding=&quot;5&quot; cellspacing=&quot;2&quot;&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td style=&quot;text-align: center; width: 208px&quot;&gt;&lt;a href=&quot;http://www.pragmaticcso.com&quot;&gt;&lt;img src=&quot;http://www.pragmaticcso.com/Images/P-CSO-Cover-170w.jpg&quot; style=&quot;border: 0px solid ; width: 170px; height: 259px&quot; alt=&quot;The Pragmatic CSO&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;The
			Pragmatic CSO: &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Available Now! &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Read the Intro and
			Get &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&amp;quot;5 Tips to be a
			Better CSO&amp;quot;&lt;/span&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;a href=&quot;http://www.pragmaticcso.com/&quot; style=&quot;font-weight: bold&quot; target=&quot;_blank&quot;&gt;www.pragmaticcso.com&lt;/a&gt;&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;br /&gt;
			&lt;span style=&quot;font-family: Arial&quot;&gt;&lt;/span&gt;&lt;/td&gt;
			&lt;td style=&quot;text-align: center&quot;&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;big&gt;&lt;big&gt;&lt;big&gt;Follow
			me on Twitter:&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;/span&gt;&lt;a href=&quot;http://www.twitter.com/securityincite&quot; target=&quot;_blank&quot;&gt;@securityincite&lt;/a&gt;&lt;/big&gt;&lt;/big&gt;&lt;/big&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;img src=&quot;http://www.pragmaticcso.com/Images/twitter-logo.jpg&quot; alt=&quot;Twitter&quot; style=&quot;width: 225px; height: 82px&quot; /&gt;&lt;br /&gt;
			&lt;br /&gt;
			I&#039;m not sure where I&#039;m going, but I&#039;ll get there in 140 characters - or
			less...&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.pragmaticcso.com/&quot; style=&quot;font-weight: bold&quot; target=&quot;_blank&quot;&gt;&lt;/a&gt;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;
&lt;h1&gt;Incite 4 U&lt;/h1&gt;
As you can imagine, quite a bunch of stuff has accumulated since the
summer. So I&#039;ll pick some timely topics to cover, as well as some
important stuff from my archives. The plan is to publish on Monday,
Wednesday and Friday for a while and get back to a consistent drumbeat
of Incite to make you laugh, cry, maybe learn something, but most
importantly long for the days when I wasn&#039;t writing so frequently.&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;IBM (maybe)
	takes out Guardium&lt;/span&gt; - We all knew it was just a matter of
	time before someone acquired the bigger Database Activity Monitoring
	start-ups. Looks like Guardium is the first to take the money and run.
	And with &lt;a href=&quot;http://news.yahoo.com/s/nm/20091129/bs_nm/us_guardium_ibm&quot; target=&quot;_blank&quot;&gt;a reported $225 million of IBM&#039;s cash&lt;/a&gt;,
	they can run for a while. Clearly protecting the database is a key part
	of any security program and the DAM folks have shown it can be done at
	enterprise scale. IBM  likely paid a very healthy
	multiple (probably in the 7-8x bookings range) because Guardium was the
	first to cleanly support DAM for databases on the big iron. That is
	something IBM had to control. &lt;a href=&quot;http://securosis.com/blog/guardium-acquired-by-ibm&quot; target=&quot;_blank&quot;&gt;Adrian from Securosis provides his take on
	the deal&lt;/a&gt; as well.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Security
	success? Remember the Credibility Bank &lt;/span&gt;- I wrote the &lt;a href=&quot;http://www.pragmaticcso.com&quot; target=&quot;_blank&quot;&gt;Pragmatic
	CSO&lt;/a&gt; in the latter part of 2006. It&#039;s hard to believe it&#039;s
	been 3 years, but I have to say the message continues to resonate and
	appear in places that I never expected. Not directly, but from a
	philosophy standpoint. Take this article in &lt;a href=&quot;http://www.scmagazineus.com/seizing-management-power/article/157235/&quot; target=&quot;_blank&quot;&gt;SC Mag about Seizing Management Power&lt;/a&gt;.
	You don&#039;t really &amp;quot;seize&amp;quot; power, rather you earn it. It&#039;s really about
	the need for security folks to talk business and persuade their peers
	that protecting information is good for their business. It all gets
	back to credibility. If you don&#039;t have it, you can&#039;t execute on any
	kind of security program. Pure and simple.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Maybe the CIO
	is your friend, but not mine... &lt;/span&gt;- Following up on the
	previous snippet about talking the language of business is &lt;a href=&quot;http://securosis.com/blog/the-cio-is-your-friend/&quot; target=&quot;_blank&quot;&gt;a post from Mortman on the Securosis blog&lt;/a&gt;
	relative to the reality that most CIO level folks don&#039;t have a clue
	about how to be relevant to the business. The reality is, YOU as the
	security professional cannot be hindered by that. If your CIO get it,
	all the better. If not, you still have to build relationships with the
	business folks and still position security as good for the business.
	Mort&#039;s ideas on having someone to work with on messaging and making
	sure your stuff is professionally done is absolutely critical to
	building the credibility you know you need. &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Valuing
	Assets, using Lindstrom&#039;s Razor&lt;/span&gt; - For a guy who shaves
	once a week, whether I need to or not, the idea of a Razor being
	wielded by Grumpy Pete is outright terrifying. Kind of like a slasher
	movie set in a data center. I can just see Pete hacking away at
	Jaquith&#039;s stilts (oh, I think those are his legs) or Hoff&#039;s halo (he is
	the almighty, isn&#039;t he?). But seriously, &lt;a href=&quot;http://blogs.forrester.com/srm/2009/10/information-asset-value-some-coldhearted-calculations-.html&quot; target=&quot;_blank&quot;&gt;Andy does pose an interesting thought
	experiment&lt;/a&gt; based on Grumpy Pete&#039;s ideas on valuing assets
	using a floor value based on the amount of money you are willing to pay
	to secure it. Hmmm. &lt;a href=&quot;http://1raindrop.typepad.com/1_raindrop/2009/10/lindstroms-razor.html&quot; target=&quot;_blank&quot;&gt;Gunnar expands on this a bit as well.&lt;/a&gt;
	The reality is most folks have NO IDEA what they are paying to secure
	much of anything. They have a security rock and they hit pretty much
	anything they can with it. Very few organizations actually decide on an
	asset (or even a business system) basis what they are willing to spend
	to protect it. They should, but they don&#039;t. But it&#039;s a good though
	experiment anyway.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Profiling
	application traffic on a blade&lt;/span&gt; - Amazingly enough, the
	news that &lt;a href=&quot;http://finance.yahoo.com/news/Check-Point-to-Add-Security-iw-3798963261.html?x=0&amp;amp;.v=1&quot; target=&quot;_blank&quot;&gt;Check Point acquired FaceTime&#039;s application
	database&lt;/a&gt; didn&#039;t make the 11 o&#039;clock news. They probably paid
	FaceTime in Starbucks cards. But the concept is interesting, in being
	able to deploy application profiling on a software blade on the gateway
	does open up a number of cool policies you can deploy, especially
	relative to egress filtering. This was clearly a cheaper way to get
	better application visibility than buying Palo Alto (which they should
	do anyway). Yes, the perimeter gateway is getting smarter, no the
	&amp;quot;secure network fabric&amp;quot; is nowhere close, and the reality is the action
	is what&#039;s happening inside the protocols and we security folks need to
	get a lot smarter on application attacks - stat!&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Security
	&amp;quot;scorecards&amp;quot; - love and mostly hate&lt;/span&gt; - I&#039;ve had a love/hate
	relationship with the concept of metrics for a long time. On one hand
	(love), I realize the importance of measurement and counting and all
	that other good stuff that creates pie charts for the CFO. But my
	pragmatic gene kicks in (hate) and I realize the effort required to
	really quantify the impact of security doesn&#039;t leave a lot of time or
	resources to actually secure much. I look at &lt;a href=&quot;http://newschoolsecurity.com/2009/09/12-tips-for-designing-an-infosec-risk-scorecard-its-harder-than-it-looks/&quot; target=&quot;_blank&quot;&gt;a post like Russell&#039;s diatribe on building
	an InfoSec Risk Scorecard&lt;/a&gt;, with a sort of numb bemusement.
	The post is great and the tips are right on. But it&#039;s just hard for me
	to see most security folks going through the effort. One of the tips
	really hits home: &amp;quot;&lt;span style=&quot;font-style: italic&quot;&gt;If
	your bosses really need a good InfoSec Risk Scorecard, then they should
	be prepared to pay for it.&lt;/span&gt;&amp;quot; Therein lies the rub, most
	bosses don&#039;t care about a security scorecard (they just want to be
	secure) and they are certainly not going to pay a lot for it. Thus,
	they ongoing futility of security metrics.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Tao votes for
	Leadership&lt;/span&gt; - It&#039;s funny, but the political hype machine is
	already talking about the mid-term elections happening next November.
	Solving the &amp;quot;cyber-security&amp;quot; problem continues to be a hot topic in the
	Fed space. Lots of folks think more efficient buying in an answer, or
	throwing a few more products at the problem. &lt;a href=&quot;http://taosecurity.blogspot.com/2009/10/partnerships-and-procurement-are-not.html&quot; target=&quot;_blank&quot;&gt;Richard is clearly voting here for leadership&lt;/a&gt;,
	not any of these other shiny objects (many espoused by the
	self-proclaimed cyber-war research czar Stiennon). And he&#039;s exactly
	right. We have to get sick of losing and then we&#039;ll devote the
	resources necessary to win. On an aside, is anyone else starting to
	puke every time I see the term &amp;quot;cyber-X.&amp;quot; I know the Feds are spending
	money on security products, but a horrifying number of vendors are
	repositioning their stuff to address the &amp;quot;cyber&amp;quot; issue and in reality
	it&#039;s just another marketing shiny object and too many dim-wits can&#039;t
	tell the ruse for what it is. &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Writing the
	LRD&lt;/span&gt; - This isn&#039;t really security-oriented, but I wanted to
	point to &lt;a href=&quot;http://www.pragmaticmarketing.com/publications/topics/09/before-the-market-requirements-document&quot; target=&quot;_blank&quot;&gt;a great post on the Pragmatic Marketing site
	about writing a &amp;quot;life requirements document.&amp;quot;&lt;/a&gt; So of you call
	them goals, others a set of guiding principles, but all the same - you
	can&#039;t be good at your job or particularly happy unless you&#039;ve given
	some thought to what makes you happy and what you like to do. Too many
	of us just meander through our lives getting through each day and
	looking forward to watching a football game, drinking a brew with
	buddies, or playing catch with the kids. So that is an awful lot of
	time spent waiting for something else. So read the post and give the
	approach some thought. Personally, I set goals, but an LRD structure
	may work for some of you.&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
</description>
 <comments>http://securityincite.com/blog/mike-rothman/the-daily-incite-11-30-09-giving-thanks#comments</comments>
 <category domain="http://securityincite.com/security-incite-rants/daily-incite">Daily Incite</category>
 <pubDate>Mon, 30 Nov 2009 10:10:36 -0600</pubDate>
 <dc:creator>Mike Rothman</dc:creator>
 <guid isPermaLink="false">1094 at http://securityincite.com</guid>
</item>
<item>
 <title>Incite Rides Again</title>
 <link>http://securityincite.com/blog/mike-rothman/incite-rides-again</link>
 <description>&lt;p&gt;
I was laid off from eIQ yesterday. I know it was a tough decision for the folks up there. Business decisions can be that way. I feel for them that they feel bad. They shouldn&#039;t. &lt;br /&gt;
&lt;br /&gt;
Am I disappointed? Yes. But not for the reasons you&#039;d think. I really enjoyed working with some members of the team, and I&#039;ll miss that. Some parts of the job were fun and interesting. I&#039;ll miss that too.&lt;br /&gt;
&lt;br /&gt;
But most of the stuff I won&#039;t miss. At all. &lt;br /&gt;
&lt;br /&gt;
&lt;img src=&quot;http://www.pragmaticcso.com/Images/hi-yo_silver.jpg&quot; align=&quot;left&quot; height=&quot;240&quot; hspace=&quot;10&quot; vspace=&quot;10&quot; width=&quot;156&quot; /&gt;As I was thinking back, it turns out the tenure of my last 3 vendor jobs has been exactly 15 months. I know, kind of strange, eh? Don&#039;t think they have an actuarial table to predict that. Yet this last experience has finally brought me to the realization that working for a vendor isn&#039;t the best use of my skills. Sometimes I&#039;m a little slow on the uptake. &lt;br /&gt;
&lt;br /&gt;
There are lots of reasons a vendor job isn&#039;t the best fit, but three really stick out like a sore thumb. The first is competition. I used to be very very competitive growing up. Life was a zero sum game and I wanted to win - everything. I used to joke that I wanted to be king of all I survey. As I&#039;ve gotten older, my need to win is much less acute. So the hand to hand combat of working for a vendor in a competitive market space is not only tiring, it&#039;s soul crushing. &lt;br /&gt;
&lt;br /&gt;
After my experience at CipherTrust, I figured that I didn&#039;t like the competition because I was on the losing team. But that&#039;s not it. I&#039;m not interested in tracking the time it takes the competition to copy my messaging anymore. Win or lose, I&#039;m tired of the competition. And if you don&#039;t want to compete every day for every deal, you shouldn&#039;t be working for a vendor in a competitive space.&lt;br /&gt;
&lt;br /&gt;
I also don&#039;t like breaking things that aren&#039;t broken. So the first 6 months with a vendor are fine. Things are broken and I fix them. The positioning. The web site. The product marketing and sales toolkits. The product strategy. But after about 12 months, everyone thinks things are broken again. Shiny objects start flashing that &amp;quot;need&amp;quot; attention. And that takes focus away from what is really important. You are forced to go through this dance of trying to figure out what is broken and what isn&#039;t. And the answer &amp;quot;I did it right the first time&amp;quot; doesn&#039;t really fly (I tried that the first time, it didn&#039;t go very well). These gyrations are so much fun, I&#039;d rather give myself an enema with a branding iron than reposition the company around the latest hot buzzword. &lt;br /&gt;
&lt;br /&gt;
But neither of these are the real kicker, there are parts of every job you don&#039;t like. For me, it&#039;s all about the passion. The best performers I know are really passionate about what they are doing. They just love what they do and would do it whether they were getting paid or not. I can tell you I was not passionate about my last 3 vendor gigs. &lt;br /&gt;
&lt;br /&gt;
And to do something all day, every day that you are not passionate about is tiring and soul crushing. So I did my best each day and would anxiously await the day when they would pay me to not do marketing, which happens to be about 15 months after I start. &lt;br /&gt;
&lt;br /&gt;
But ultimately this gets back to me. When I left TruSecure, it was them. At least that&#039;s what I convinced myself. 17 months later (2 months to get the CipherTrust job and then 15 months there) I left CipherTrust and it was still them, but I was tired of working for someone else. So I started Security Incite.&lt;br /&gt;
&lt;br /&gt;
I joined eIQ because it seemed the stars were aligning and it was going to be different this time. 15 months later, it&#039;s not different. And it&#039;s not them. It&#039;s me. And I&#039;m OK with that. Really, truly OK.&lt;br /&gt;
&lt;br /&gt;
You see, life is a journey and I&#039;m finally starting to realize that there is no right path or wrong path. There is only the path. eIQ and my other vendor experiences were part of that path. But as I look ahead, my path doesn&#039;t involve working for a vendor.&lt;br /&gt;
&lt;br /&gt;
Given that Thanksgiving is next week, I&#039;m going to lay low for the next few weeks. Get back into a routine of taking care of myself first. Writing the manifesto that accompanies my new Happyness content (&lt;a href=&quot;http://www.csoonline.com/article/506576/7_Ways_to_Stay_Happy_in_a_Miserable_Profession&quot; target=&quot;_blank&quot;&gt;Bill Brenner of CSO did a piece on the talk&lt;/a&gt;). Talking to old friends and plotting my next move.&lt;br /&gt;
&lt;br /&gt;
So that was a long winded way of saying: INCITE RIDES AGAIN on November 30.&lt;br /&gt;
&lt;br /&gt;
It&#039;s good to be home.
&lt;/p&gt;
&lt;p&gt;
&lt;small&gt;Photo credit: &amp;quot;Hi-Yo, Silver!&amp;quot; originally uploaded by &lt;a href=&quot;http://www.flickr.com/photos/roscoe/399355515/&quot; target=&quot;_blank&quot;&gt;arellis49&lt;/a&gt; &lt;/small&gt;
&lt;/p&gt;
</description>
 <comments>http://securityincite.com/blog/mike-rothman/incite-rides-again#comments</comments>
 <category domain="http://securityincite.com/news/si-announcements">SI Announcements</category>
 <pubDate>Tue, 17 Nov 2009 07:14:05 -0600</pubDate>
 <dc:creator>Mike Rothman</dc:creator>
 <guid isPermaLink="false">1093 at http://securityincite.com</guid>
</item>
<item>
 <title>Pragmatic CSO Bootcamp #2 (and book discount offer)</title>
 <link>http://securityincite.com/blog/mike-rothman/pragmatic-cso-bootcamp-2-and-book-discount-offer</link>
 <description>&lt;p&gt;
&lt;img src=&quot;http://www.pragmaticcso.com/Images/P-CSO-Weekly-banner.jpg&quot; style=&quot;width: 400px; height: 69px&quot; alt=&quot;Pragmatic CSO Weekly&quot; /&gt;
&lt;/p&gt;
&lt;div id=&quot;leftcontent&quot;&gt;
&lt;h1&gt;October 7, 2009 - Bootcamp #2 &lt;/h1&gt;
&lt;p&gt;
&lt;img src=&quot;http://www.pragmaticcso.com/Images/MSR-black-HS-small.jpg&quot; style=&quot;width: 104px; height: 137px; float: left&quot; alt=&quot;Mike Rothman&quot; hspace=&quot;10&quot; /&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Mike&#039;s
Pep Talk:&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://thinkexist.com/quotation/i_found_there_was_only_one_way_to_look_thin-hang/297213.html&quot; target=&quot;_blank&quot;&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
&amp;quot;&lt;span style=&quot;font-style: italic&quot;&gt;It would be
better if you begin to teach others only after you yourself have
learned something.&lt;/span&gt;&amp;quot;&lt;br /&gt;
-- Albert Einstein
&lt;/p&gt;
&lt;p&gt;
I am a fortunate guy. The journey I&#039;m on continues to amaze
and astound me. I viewed The Pragmatic CSO as my opportunity to give a
little back based on all of the great people that have taught me the
ropes through the years. Though I&#039;ve been pretty much silent over the past year on P-CSO activities, I still like to give back and when the opportunity presents itself to
give folks that haven&#039;t been exposed another chance to get
Pragmatic.
&lt;/p&gt;
&lt;p&gt;
Once again, I&#039;m happy to partner with the folks at the &lt;a href=&quot;http://www.businessofsecurity.com/index.htm&quot; target=&quot;_blank&quot;&gt;Business of Security site&lt;/a&gt; to run a
series of webcasts and virtual&lt;img src=&quot;http://www.pragmaticcso.com/Images/army-bootcamp.jpg&quot; style=&quot;border: 0px solid ; width: 240px; height: 139px; float: right&quot; alt=&quot;You&#039;re in the army now...&quot; vspace=&quot;15&quot; hspace=&quot;15&quot; /&gt; peer group sessions to run
folks through the boot camp I put together a few years ago. In this kind of
economic environment, it&#039;s all the more critical that every security
professional be focused on adding value and selling the benefits of
security. Being Pragmatic is certainly a time-proven method to doing
that.
&lt;/p&gt;
&lt;p&gt;
The first session doesn&#039;t cost anything and will be held this Tuesday via webcast. I&#039;ll run through the P-CSO process and then dive into the first section of the P-CSO - &amp;quot;Plan to be
Pragmatic.&amp;quot;&lt;span style=&quot;font-family: verdana&quot;&gt; I&#039;ll also go into the beginning of Section 2 - &amp;quot;Building Your Pragmatic Security Environment.&amp;quot;&lt;br /&gt;
&lt;/span&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;span style=&quot;font-family: verdana&quot;&gt;Even better,
through the generosity of the Business of Security folks (and my
employer, &lt;a href=&quot;http://www.eiqnetworks.com&quot; target=&quot;_blank&quot;&gt;eIQ&lt;/a&gt;) I&#039;m able to offer attendees
to the session a &lt;span style=&quot;font-weight: bold&quot;&gt;50%
discount&lt;/span&gt; on the book and/or PDF. But to get the discount,
you&#039;ll need a special discount code that will be provided during the session. &lt;/span&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;span style=&quot;font-family: verdana&quot;&gt;SO, if you&#039;ve
been waiting to for the price of the P-CSO to come down - this is your
chance.&lt;/span&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;span style=&quot;font-family: verdana&quot;&gt;There will
also be a special discount for folks that want to participate in the
follow-on sessions when I present the rest of the boot camp. More details will be available during the session.
&lt;/span&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;span style=&quot;font-family: verdana&quot;&gt;Here is the
link to the &lt;a href=&quot;http://www.businessofsecurity.com/ThePragmaticCSO.htm&quot; target=&quot;_blank&quot;&gt;registration page&lt;/a&gt;. I hope to see
you on Tuesday.&lt;/span&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;small&gt;&lt;span style=&quot;font-family: verdana&quot;&gt;Photo
credit: &lt;a href=&quot;http://www.flickr.com/photos/soldiersmediacenter/1542160137/&quot; target=&quot;_blank&quot;&gt;Army.mil&lt;/a&gt;&lt;/span&gt;&lt;/small&gt;
&lt;/p&gt;
&lt;div style=&quot;text-align: center&quot;&gt;
&lt;p&gt;
&amp;nbsp;
&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
</description>
 <comments>http://securityincite.com/blog/mike-rothman/pragmatic-cso-bootcamp-2-and-book-discount-offer#comments</comments>
 <category domain="http://securityincite.com/security-incite-rants/p-cso-weekly">P-CSO Weekly</category>
 <category domain="http://securityincite.com/news/si-announcements">SI Announcements</category>
 <pubDate>Wed, 07 Oct 2009 15:34:11 -0500</pubDate>
 <dc:creator>Mike Rothman</dc:creator>
 <guid isPermaLink="false">1092 at http://securityincite.com</guid>
</item>
<item>
 <title>The Daily Incite - 8/24/09 - Difficult People</title>
 <link>http://securityincite.com/blog/mike-rothman/the-daily-incite-8-24-09-difficult-people</link>
 <description>&lt;div style=&quot;text-align: center&quot; id=&quot;topcontent&quot;&gt;
&lt;img src=&quot;http://www.geronimollc.com/Geronimo/DailyInciteTopBanner2.jpg&quot; style=&quot;width: 448px; height: 107px&quot; alt=&quot;Today&#039;s Daily Incite&quot; /&gt;
&lt;/div&gt;
&lt;div style=&quot;font-size: 10pt; font-family: Arial&quot; id=&quot;leftcontent&quot;&gt;
&lt;h2&gt;August 24, 2009 - Volume 4, #33 &lt;/h2&gt;
Good Morning: &lt;br /&gt;
We start school pretty early in the South. Today is the beginning of
the third week of school for the rats. They are getting into the
schedule a bit, though getting up at 6:30 AM is probably something
they&#039;ll never get used to. By Thursday, the boy is complaining about
wanting to get back in bed. After telling him about 20 times that it&#039;s
not an option, he&#039;ll begrudgingly put on his clothes and sulk through
the rest of the morning ritual. Thank the heavens for GoGurt, since
that seems to be something the kids like in the AM. We freeze them, and
it keep them occupied and not bitching. &lt;br /&gt;
&lt;p&gt;
&lt;a href=&quot;http://www.iphonesavior.com/images/2008/07/18/iphone_app_store_addiction.jpg&quot;&gt;&lt;img src=&quot;http://www.pragmaticcso.com/Images/difficult_people.jpg&quot; alt=&quot;How about using a bat? That works great....&quot; style=&quot;border: 0px solid ; width: 180px; height: 240px; float: right&quot; vspace=&quot;10&quot; hspace=&quot;10&quot; /&gt;&lt;/a&gt;But as with
everything else, life would be a lot easier if we didn&#039;t have to deal
with people. That&#039;s a big part of the reason I work remotely, and how
in a perfect world, I wouldn&#039;t have to deal with people much at all.
Between ATMs and Pay at the Pump, I don&#039;t really have to interact with
anyone. Which is a good thing for all involved. Yet, for the kids,
being as anti-social as their old man is not an option. Nor should it
be.&lt;br /&gt;
&lt;br /&gt;
The big lesson this year is how to deal with difficult people. We all
know them, we all try to avoid them, but sometimes that isn&#039;t an option
and it creates angst. Especially for a high-strung Dad, who doesn&#039;t
like anyone giving his kids a hard time. But it&#039;s a teaching
opportunity, but the real question is what to teach.&lt;br /&gt;
&lt;br /&gt;
Of course, my first instinct is to teach them how to wield a bat most
effectively to create the most pain, while leaving the fewest marks.
That is a time-tested means in dealing with difficult people, and they
usually cause very few problems after a date with Mr. Easton. But
that&#039;s probably not the best approach for kids today, especially given
the litigious nature of most folks. So I guess we need to scratch that
approach off the list.&lt;br /&gt;
&lt;br /&gt;
Next is what I&#039;ll call the &amp;quot;biting sarcasm&amp;quot; approach. Basically, slice
the difficult person into little pieces verbally and make them question
their value in society. Yep, I&#039;ve used that one before pretty
effectively, but it does require some verbal sparring skill, a quick
wit and an adversary that understands you are calling them an idiot.
Again, this may not be the best approach for my young kids. As they get
older, we&#039;ll have more success with this method, but not quite yet. &lt;br /&gt;
&lt;br /&gt;
Of course, neither of these will win me a Parent of the Year award. The
point is really to teach the kids to be better than that. To face down
the difficulty and handle it with elegance and grace. To call out the
person, make it clear to them they are not being nice, and then ignore
them. And do that time and time again because difficult people rarely
stop until they get a rise out of you. So we have to constantly
reinforce and coach the kids to not take the bait. Don&#039;t let them see
their words bother you. Don&#039;t give them the satisfaction. 
&lt;/p&gt;
&lt;p&gt;
Though I still have a lot of work to do in my own right, this
is what we work on with the kids almost daily. Not only with external
folks, but this skill is important for inter-family dynamics. At any
given time, one of the kids is being difficult. So these are skills
they need and trying to raise kids better than myself is certainly a
goal.&lt;br /&gt;
&lt;/p&gt;
Of course, I still maintain my &amp;quot;people to kill today&amp;quot; list and am sure
to put these difficult kids on it. I guess old habits are hard to
break. Have a
great day. &lt;br /&gt;
&lt;p&gt;
&lt;br /&gt;
&lt;small&gt;Photo: &amp;quot;&lt;span style=&quot;font-style: italic&quot;&gt;How
to Cope with DIFFICULT PEOPLE&lt;/span&gt;&amp;quot; originally uploaded
by &lt;a href=&quot;http://www.flickr.com/photos/benterrett/3127971140/&quot; target=&quot;_blank&quot;&gt;benterrett&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;small&gt;Technorati: &lt;a href=&quot;http://technorati.com/tag/information%20security&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Information
Security&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;&lt;/small&gt;,
&lt;small&gt;&lt;a href=&quot;http://www.technorati.com/tag/Security%20Mike&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Security
Mike&lt;/a&gt;, &lt;a href=&quot;http://www.technorati.com/tag/Internet%20Security&quot; target=&quot;_blank&quot; rel=&quot;tag&quot;&gt;Internet
Security&lt;/a&gt;&lt;/small&gt;&lt;br /&gt;
&lt;/p&gt;
&lt;table style=&quot;width: 481px; height: 276px; text-align: left; margin-left: auto; margin-right: auto&quot; border=&quot;0&quot; cellpadding=&quot;5&quot; cellspacing=&quot;2&quot;&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td style=&quot;text-align: center; width: 208px&quot;&gt;&lt;a href=&quot;http://www.pragmaticcso.com&quot;&gt;&lt;img src=&quot;http://www.pragmaticcso.com/Images/P-CSO-Cover-170w.jpg&quot; alt=&quot;The Pragmatic CSO&quot; style=&quot;border: 0px solid ; width: 170px; height: 259px&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;The
			Pragmatic CSO: &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Available Now! &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;Read the Intro and
			Get &lt;/span&gt;&lt;br style=&quot;font-weight: bold&quot; /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&amp;quot;5 Tips to be a
			Better CSO&amp;quot;&lt;/span&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;a href=&quot;http://www.pragmaticcso.com/&quot; target=&quot;_blank&quot; style=&quot;font-weight: bold&quot;&gt;www.pragmaticcso.com&lt;/a&gt;&lt;br /&gt;
			&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;br /&gt;
			&lt;span style=&quot;font-family: Arial&quot;&gt;&lt;/span&gt;&lt;/td&gt;
			&lt;td style=&quot;text-align: center&quot;&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;&lt;big&gt;&lt;big&gt;&lt;big&gt;Follow
			me on Twitter:&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;/span&gt;&lt;a href=&quot;http://www.twitter.com/securityincite&quot; target=&quot;_blank&quot;&gt;@securityincite&lt;/a&gt;&lt;/big&gt;&lt;/big&gt;&lt;/big&gt;&lt;br /&gt;
			&lt;br /&gt;
			&lt;img src=&quot;http://www.pragmaticcso.com/Images/twitter-logo.jpg&quot; style=&quot;width: 225px; height: 82px&quot; alt=&quot;Twitter&quot; /&gt;&lt;br /&gt;
			&lt;br /&gt;
			I&#039;m not sure where I&#039;m going, but I&#039;ll get there in 140 characters - or
			less...&lt;span style=&quot;text-decoration: underline&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.pragmaticcso.com/&quot; target=&quot;_blank&quot; style=&quot;font-weight: bold&quot;&gt;&lt;/a&gt;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;
&lt;h1&gt;Incite 4 U&lt;/h1&gt;
Candidly, it&#039;s been a slow summer for security news. I guess it usually
is, but this summer seems even slower. There is a lot of activity on
Twitter, at least in terms of good productive dialog, but I can&#039;t get
confused between discussions on Twitter and what is happening in the
real world. Sometimes we get myopic and think that because you have a
good discussion with some smart people, the rest of the world is
following along. They are not.&lt;br /&gt;
&lt;br /&gt;
So we&#039;ve seem some news about the retailer breaches, and per usual, it
was an unsophisticated attack executed well. Fortinet filed papers for
an IPO, so there is hope a number of companies can gain exit velocity
and show security is a thriving industry. Yet, the conversations I&#039;m
having with most folks is still about relevance. Everyone knows they
are being attacked and breaches are happening. But we are still
fighting to overcome the reality that senior management wants to spend
the least amount possible on security.&lt;br /&gt;
&lt;br /&gt;
Right, just like insurance. I&#039;ve mentioned this before, but in reality
we&#039;ve got to sell security like we sell insurance. A candid assessment
of what can kill you, and then a set of options for how much an
organization will pay to mitigate those risks. All the while,
understanding that there is no panacea and you can still get hit by a
truck (or a SQL injection attack) regardless of how much you spend. OK,
off soapbox and onto what (little) I&#039;m seeing out there.&lt;br /&gt;
&lt;ol&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Living with
	Awareness&lt;/span&gt; - No I&#039;m not going on a Buddha-tinged rampage
	(irony intentional), I&#039;m pointing to a post from &lt;a href=&quot;http://taosecurity.blogspot.com/2009/06/digital-situational-awareness-methods.html&quot; target=&quot;_blank&quot;&gt;Bejtlich regarding Digital Situational
	Awareness&lt;/a&gt;. At my day job, there are a lot of cycles focused
	on protecting against cyber-attacks and of course, the term de jour for
	that is &amp;quot;situational awareness,&amp;quot; which my pea brain interprets as
	security posture. Anyhow, Richard describes a number of levels of how
	aware you are of your security posture - ranging from waiting until
	your credit brand informs you of a breach to proactive intelligence
	gathering to determine who is targeting you and how. Most are within
	the first three buckets (external notification, vulnerability
	assessment, penetration testing) and that may be OK, depending on what
	you are protecting. But knowing where your not is always an important
	thing to realize.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;The User
	Frustration Metric &lt;/span&gt;- Security is a trade-off, it&#039;s a
	simple as that. We all know that, but we forget because we are mired in
	the day to day battles and the politics and the futility. The safest
	device is one not connected to anything. Alex, whose rural existence is
	giving him lots of time to think, comes up with something that is
	pretty interesting. &lt;a href=&quot;http://newschoolsecurity.com/2009/08/quantitative-analysis-of-web-application-usefulness-or-why-your-rosi-is-wrong/&quot; target=&quot;_blank&quot;&gt;The user frustration metric.&lt;/a&gt; Yup,
	a lot of folks go around security controls because it frustrates them,
	so if we measure that frustration and then use it as an input into our
	cost-benefit analysis, we&#039;d get some interesting results, no? Of
	course, really measuring this is hard (and probably not worth the
	effort), BUT it is a good line of thinking to understand if any new
	security controls we&#039;re implementing is worth the effort or whether it
	will cause more misery and suffering.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;ConSentry buh
	bye &lt;/span&gt;- Yup, another start-up goes down. Actually I&#039;m
	surprised we don&#039;t see more investors pulling the plug on companies
	going nowhere fast. Of course, knowing folks at ConSentry, it&#039;s always
	sad. But all the same, statistics are statistics. Not all companies
	work. Here is &lt;a href=&quot;http://www.networkworld.com/news/2009/082009-consentry-folds.html&quot; target=&quot;_blank&quot;&gt;the NWW coverage of ConSentry&#039;s demise&lt;/a&gt;.
	But more interestingly &lt;a href=&quot;http://www.stillsecureafteralltheseyears.com/ashimmy/2009/08/one-up-one-down-are-reports-of-consentrys-demise-premature.html&quot; target=&quot;_blank&quot;&gt;Shimmy does a good obit for Inline NAC&lt;/a&gt;,
	and also &lt;a href=&quot;http://www.stillsecureafteralltheseyears.com/ashimmy/2009/08/knock-nac-knack-for-nac-who-gives-a-nac.html&quot; target=&quot;_blank&quot;&gt;a bit more analysis of NAC&lt;/a&gt;
	pointing to a piece from &lt;a href=&quot;http://blogs.gartner.com/john_pescatore/2009/08/21/nac-is-a-knack/&quot; target=&quot;_blank&quot;&gt;John Pescatore on some of the more
	compelling use cases for the technology&lt;/a&gt;. As I&#039;ve long said,
	NAC is a feature and really should be embedded within the network.
	That&#039;s happening slowly and provides a short term opportunity for the
	out-of-band flavor of NAC, until switches go through another
	generational update.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Fighting the
	AppSec fight&lt;/span&gt; - Big J continues to try to help security
	folks understand how to position an application security program within
	their own organizations. Of course, many of us know why it&#039;s important
	to write code securely, but when you have compliance mandates and years
	of conditioning that putting a widget in front of whatever you want to
	protect will work - there is precious little incentive to do the hard
	work of secure coding. &lt;a href=&quot;http://jeremiahgrossman.blogspot.com/2009/08/overcoming-objections-to-application.html&quot; target=&quot;_blank&quot;&gt;Jeremiah does a nice role play in surfacing
	and then discussing many of the objections&lt;/a&gt; developers bring
	forward, mostly around not my problem, it&#039;s the security guys issue.
	Which it is, but selling the benefits of doing it right the first time
	is still way too hard.   &lt;span style=&quot;font-weight: bold&quot;&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;MSS hits the
	tipping point&lt;/span&gt; - Andreas from Nemertes uses &lt;a href=&quot;http://www.networkworld.com/columnists/2009/081909antonopoulos.html&quot; target=&quot;_blank&quot;&gt;his NetworkWorld column to highlight some
	research showing security services gaining adoption&lt;/a&gt;. I can
	say &lt;a href=&quot;http://www.eiqnetworks.com&quot; target=&quot;_blank&quot;&gt;my
	overlords&lt;/a&gt; are seeing a similar trend. As the economy has
	tightened, a lot more folks are suspending their disbelief about who
	should be monitoring what and looking to outsource things not core to
	their operations. To be clear, managed security services are not always
	cheaper (especially in the long run), but there is a cost to staffing
	and buying the tools for a SOC, so it&#039;s certainly something every
	organization should consider. A real concern is that 40% of the
	benchmark claim their outsourcing engagement is NOT a success. The key
	is to scope effectively and manage the crap out of the service provider.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;You&#039;re
	auditor hates you too&lt;/span&gt; - One of my favorite posts is from &lt;a href=&quot;http://www.securitycatalyst.com/the-auditors-prerogative/&quot; target=&quot;_blank&quot;&gt;Jeff Kirsch, who unabashedly lets you know
	that auditors are onto your game&lt;/a&gt;, know you are lying to them,
	and don&#039;t like you too much either. Seriously, part of the P-CSO
	process is to treat an auditor like a peer. Lying to them and making
	things hard for them to do their job is not the path to success. Read
	the post, laugh a bit and then take the message to heart: &amp;quot;&lt;span style=&quot;font-style: italic&quot;&gt;Having a good relationship with
	your auditor does not mean you have to be friends, but it does mean you
	need to find common ground to share trust.&lt;/span&gt;&amp;quot; Amen to that.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;The impact of
	the social networked generation&lt;/span&gt; - Pescatore, who&#039;s been
	busy blogging, brings up a good point that we in the protection game
	need to stay focused on. Namely, &lt;a href=&quot;http://blogs.gartner.com/john_pescatore/2009/08/19/what-does-the-college-class-of-2013-think-about-security/&quot; target=&quot;_blank&quot;&gt;the impact of this new generation of
	socially networked kids&lt;/a&gt; that will be entering the workforce
	over the next 4 years or so. These are kids that don&#039;t think twice
	about posting pictures of them (or their friends) hurling into a bucket
	or passed out by the porcelain god or doing other similar stuff that is
	funny at the time, but doesn&#039;t bode well for your security clearance.
	These folks think differently than us old timers, and that means our
	protection strategies need to evolve. Just like trying to gain the
	&amp;quot;attacker&#039;s mindset,&amp;quot; we also need to understand the mindset of the
	next generation to understand how they are going to undermine our
	security best laid plans.&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-weight: bold&quot;&gt;Measurement
	gets back to managing expectations&lt;/span&gt; - I guess we&#039;ll always
	be doing this push and pull between doing things, measuring them, and
	then telling someone else what we are up to. &lt;a href=&quot;http://www.andyitguy.com/blog/?p=791&quot; target=&quot;_blank&quot;&gt;AndyITGuy
	riffs off a Grumpy Pete concept of whether we can even measure security&lt;/a&gt;.
	Andy believes we can, but it gets back to communicating not just what
	the senior folks want to see (you know, the things that impact their
	bonus) rather all the stuff we do. In concept, that is nice, but in
	reality they don&#039;t care. So WE measure operational stuff, not because
	the senior folks care, but because we need that data to improve our own
	house. The things they care about (incident response, loss numbers,
	attack trends) are about THEM (and their bonus), so we have to
	understand (and not take personally) the reality that they don&#039;t care
	about our metrics. &lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
</description>
 <comments>http://securityincite.com/blog/mike-rothman/the-daily-incite-8-24-09-difficult-people#comments</comments>
 <category domain="http://securityincite.com/security-incite-rants/daily-incite">Daily Incite</category>
 <pubDate>Mon, 24 Aug 2009 08:36:15 -0500</pubDate>
 <dc:creator>Mike Rothman</dc:creator>
 <guid isPermaLink="false">1091 at http://securityincite.com</guid>
</item>
<item>
 <title>Appearance on the Ranting Roundtable, PCI Edition</title>
 <link>http://securityincite.com/blog/mike-rothman/appearance-on-the-ranting-roundtable-pci-edition</link>
 <description>&lt;p&gt;
&lt;img src=&quot;http://www.pragmaticcso.com/Images/big-mouth.jpg&quot; align=&quot;left&quot; height=&quot;160&quot; hspace=&quot;10&quot; vspace=&quot;10&quot; width=&quot;240&quot; /&gt;I was flattered to be invited by Rich Mogull of Securosis for the maiden voyage of the Ranting Roundtable. Basically this is a bunch of loudmouths, who need to yell and now we finally have an outlet. We didn&#039;t yell at each other (too much), use profanity (too much), abuse goats (too much) or delve into various circle jerks about the futility of our chosen profession (too much). OK, we did do the latter quite a bit, but that goes with the territory. 
&lt;/p&gt;
&lt;p&gt;
Amazingly enough, we kept the pace moving for 50 minutes or so and actually were more constructive than I hoped, since I figured with the topic of PCI, we&#039;d just decend into useless chatter, Heartland hating, and get mired in a cesspool of futility.
&lt;/p&gt;
&lt;p&gt;
But we didn&#039;t, so enjoy. Here is &lt;a href=&quot;http://securosis.com/blog/the-ranting-roundtable-pci-edition/&quot; target=&quot;_blank&quot;&gt;Rich&#039;s write-up&lt;/a&gt; and the link.
&lt;/p&gt;
&lt;blockquote&gt;
	&lt;div class=&quot;entry&quot;&gt;
	&lt;div class=&quot;entry-title&quot;&gt;
	&lt;h1&gt;The Ranting Roundtable, PCI Edition&lt;/h1&gt;
	&lt;/div&gt;
	&lt;p&gt;
	Sometimes you just need to let it all out.
	&lt;/p&gt;
	&lt;p&gt;
	With all the recent events around breaches and PCI, I thought it
	might be cathartic to pull together a few of our favorite loudmouths
	and spend a little time in a no-rules roundtable. There&#039;s a little bad
	language, a bit of ranting, and a little more productive discussion
	than I intended.
	&lt;/p&gt;
	&lt;p&gt;
	Joining me were Mike Rothman, Alex Hutton, Nick Selby, and Josh Corman. It runs about 50 minutes, and we mostly focus on PCI.
	&lt;/p&gt;
	&lt;p&gt;
	&lt;a href=&quot;http://media.libsyn.com/media/mckeay/RantingRoundtable-08202009.mp3&quot; target=&quot;_blank&quot;&gt;The Ranting Roundtable, PCI&lt;/a&gt;.
	&lt;/p&gt;
	&lt;p&gt;
	Odds are we&#039;ll do more of these in the future. Even if you don&#039;t like them, they&#039;re fun for us.
	&lt;/p&gt;
	&lt;p&gt;
	&lt;i&gt;No goats were harmed in the making of this podcast.&lt;/i&gt;
	&lt;/p&gt;
	&lt;p&gt;
	—Rich
	&lt;/p&gt;
	&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div class=&quot;entry&quot;&gt;
&lt;p&gt;
&lt;small&gt;Photo credit: &amp;quot;Big Mouth&amp;quot; originally uploaded by &lt;a href=&quot;http://www.flickr.com/photos/upchuck_norris/3359968510/&quot; target=&quot;_blank&quot;&gt;upchuck_Norris&lt;/a&gt;. &lt;br /&gt;
Any likeliness of the picture to anyone on the panel is purely coincidental. OK, not really. 
&lt;/small&gt;
&lt;/p&gt;
&lt;/div&gt;
&lt;blockquote&gt;
	&lt;div class=&quot;entry&quot;&gt;
	&lt;/div&gt;
	&lt;p&gt;
	&amp;nbsp;
	&lt;/p&gt;
&lt;/blockquote&gt;
</description>
 <comments>http://securityincite.com/blog/mike-rothman/appearance-on-the-ranting-roundtable-pci-edition#comments</comments>
 <category domain="http://securityincite.com/security-incite-rants/pci">PCI</category>
 <category domain="http://securityincite.com/security-incite-rants/podcasts">Podcasts</category>
 <category domain="http://securityincite.com/security-incite-rants/securosis">Securosis</category>
 <pubDate>Fri, 21 Aug 2009 09:37:04 -0500</pubDate>
 <dc:creator>Mike Rothman</dc:creator>
 <guid isPermaLink="false">1090 at http://securityincite.com</guid>
</item>
</channel>
</rss>
