Information Security Leader, Author, Instructor and Speaker

Default utility Image

Five Ways to Protect Your Network TAGS: | | | | Criminals lurk behind many of the darker corners of the Internet, scouting out victims and eager to pounce when they …Continue reading →

Default utility Image

Three steps to avoiding massive HIPAA violation fines TAGS: | | | Million-dollar penalties are drawing the attention of HIPAA-covered entities around the nation. To avoid running afoul of HIPAA regulations, there …Continue reading →

Default utility Image

Getting a Handle on Digital Certificates TAGS: | | It’s happened to all of us — at 4AM the phone rings and we find someone from operations on the …Continue reading →

Default utility Image

Securing Mobile Devices with Containers TAGS: | | Chances are that right now, there are hundreds or thousands of individuals around the world carrying mobile devices that hold …Continue reading →

Default utility Image

E-Mail Encryption Made Easy TAGS: | Preserving the confidentiality of electronic mail messages is one of the most vexing issues facing security professionals today.  This is …Continue reading →

Default utility Image

Securing Your Website with Digital Certificates TAGS: | | Website users are trained to recognize the signs and symbols of a secure website — from the HTTPS in the …Continue reading →

Default utility Image

VoIP eavesdropping: Hardening network security to contain VoIP risks TAGS: | Every organization considering a Voice over Internet Protocol (VoIP) telephone system deployment hears the same dire warnings: “Routing voice calls …Continue reading →

Default utility Image

P2P encryption: Pros and cons of point-to-point encryption TAGS: | There’s been a lot of buzz in security circles recently about point-to-point encryption (P2PE) technology and the potential it has …Continue reading →

Default utility Image

Keep Those Notebooks Safe With Encryption TAGS: | Every year, thousands of notebook computers go missing around the country. The security administrators responsible for the safety of those …Continue reading →

Default utility Image

Point to Point Encryption and PCI Compliance TAGS: | Many vendors are touting point-to-point encryption as a solution to limit the DSS (Payment Card Industry Standard), a regulation affecting …Continue reading →