Information Security Leader, Author, Instructor and Speaker

Default utility Image

Ransomware: How to deal with advanced encryption algorithms TAGS: | It’s 6 p.m. on a Friday, and you’re getting ready to pack up for the weekend when your telephone rings. …Continue reading →

Default utility Image

Podcast: Ransomware — How to deal with advanced encryption algorithms TAGS: | It’s late in the day, and your CEO reports a strange message on his computer screen: his files have been …Continue reading →

Default utility Image

Worst practices: Encryption conniptions TAGS: | Here at SearchSecurity.com, we writers spend a great deal of time and energy helping information security professionals explore new security …Continue reading →

Default utility Image

Mobile device security in six simple steps TAGS: | | Two thousand six was the year of laptop theft. In February, a laptop was stolen from an Ernst & Young …Continue reading →

Default utility Image

Enterprise security in 2008: Addressing emerging threats like VoIP and virtualization TAGS: | | If you’re not already using a network access control product in your enterprise, chances are that you’re either preparing to …Continue reading →

Default utility Image

Implementing e-mail encryption TAGS: | Read the full article: Implementing e-mail encryption Published in SearchSecurity on 03/30/05

Default utility Image

An Introduction to SSH2 TAGS: | Secure Shell (SSH) provides a secure means of connecting computers over an inherently insecure medium. One of the most common …Continue reading →

Default utility Image

Understanding digital-certificate infrastructure TAGS: As a security professional, you’ve undoubtedly encountered the use of digital certificates to provide assurance about the identity of a …Continue reading →

Default utility Image

SSL: A quick primer TAGS: | | Most information security professionals have at least a passing familiarity with the Secure Sockets Layer (SSL) protocol. You’re probably aware …Continue reading →

Default utility Image

A Lesson in Digital Signatures TAGS: If you’ve been around the information security world long enough, chances are you’ve heard talk about how digital signatures provide …Continue reading →