Good afternoon everybody! I hope your day is going well. Things look a little different below because Delicious's API appears to be having issues at the moment. Anyway, here are today's Interesting Information Security Bits from around the web.
This post doesn't really much to do with information security specifically, but does have a lot to do with how we approach our lives and our profession.
As usual, JJ boils it down for us and gives an easy to understand post detailing the four different ways to deal with devices that are non-compliant with our NAC policies. She also offers some advice how to look at the issue from and business and security perspective.
Bruce backtracks a bit on the password masking question.
Michael is doing something really cool. He, with EMC, is releasing his book, "Into the Breach", in audio format one chapter at a time for free. That's pretty nifty, but the cool part is the invitation only conversations he will be having after each chapter. Go check it out.
Part 3 of Wesley's GhostExodus stuff is up.
Just because it was a holiday weekend in the US doesn't mean the Month of Twitter bugs didn't march on. Here is a nice recap.
That's it for today. Have fun!
Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.