Information Security Leader, Author, Instructor and Speaker

Default utility Image

Stateful vs. stateless firewalls: Understanding the differences TAGS: | | When considering stateful vs. stateless firewalls, the distinction between the two approaches may sound minor but is actually quite significant. …Continue reading →

Default utility Image

Context-Aware Intrusion Prevention TAGS: | Over the past few years, security professionals around the world have undertaken projects to convert their enterprise firewalls to the …Continue reading →

Default utility Image

Next Generation Firewalls: The New Norm in Defense TAGS: | | Increasingly sophisticated cyberattacks have led organizations to adopt correspondingly sophisticated levels of security control. Information security professionals now expect cyberattacks to be part …Continue reading →

Default utility Image

Getting Started with Next Generation Firewalls TAGS: | Next generation firewalls (NGFW) are all the rage in the information security community. Vendors are clamoring to gain a foothold …Continue reading →

Default utility Image

Four Strategies for Successful Next Generation Firewall Deployments TAGS: | Are you thinking about deploying next generation firewall technology to better protect your agency against advanced persistent threats? It’s hard …Continue reading →

Default utility Image

Managed Security Services in the Enterprise TAGS: | | | | Enterprises across a wide variety of industries are turning to cloud computing to reduce the burden on their IT support …Continue reading →

Default utility Image

Managing Network Firewalls: Taming the Beast TAGS: | Network firewalls are one of the mainstay security controls that organizations around the world rely upon to protect our networks …Continue reading →