Information Security Leader, Author, Instructor and Speaker

Default utility Image

Closing the Cybersecurity Generation Gap TAGS: | | | Businesses around the world find their workforces increasingly divided along generational lines.  As the Boomer generation nears retirement, they find …Continue reading →

Default utility Image

The Great Firewall of China TAGS: | Visitors from around the world flock to China to view one of the world’s architectural marvels: the Great Wall of …Continue reading →

Default utility Image

Code Green Networks Content Inspection Appliance 1500 TAGS: | .Code Green Networks’ Content Inspection Appliance 1500 product review Read the full article: Code Green Networks Content Inspection Appliance 1500 …Continue reading →

Default utility Image

Document Review: Document Detective 2.0 TAGS: | It’s tough enough for security personnel to review every outgoing document for sensitive information– whether it’s a pharmaceutical company’s latest …Continue reading →

Default utility Image

Integrated content filtering TAGS: | Content filters now represent a common tool in the arsenal of corporate information security groups. . These all-in one tools …Continue reading →

Default utility Image

Content Alarm 1.1 TAGS: | Information is the fuel of enterprises, and nearly every bit of that information-sensitive, restrictive and unclassified-is passed over network pipes. …Continue reading →

Default utility Image

Esafe 4.0 TAGS: | | | Content filtering typically means a mix of antivirus and antispam software, and a variety of e-mail, IM, Web and URL …Continue reading →

Default utility Image

Content Filtering: Websense Enterprise 5.5 TAGS: | Employees often take advantage of their company’s network to trade music and movie files, or chat on instant messager. Websense …Continue reading →