Information Security Leader, Author, Instructor and Speaker

Default utility Image

Enterprise Network Forensic Analysis TAGS: | Your worst nightmare just became a reality. It’s 3:00 a.m., and your boss is on the phone telling you your …Continue reading →

Default utility Image

Detecting hack attacks: Application logging is critical TAGS: | | Application servers house a wealth of valuable data. They store your organization’s Web pages, serve as the gateway to critical …Continue reading →