Information Security Leader, Author, Instructor and Speaker

Default utility Image

Five Ways to Protect Your Network TAGS: | | | | Criminals lurk behind many of the darker corners of the Internet, scouting out victims and eager to pounce when they …Continue reading →

Default utility Image

Network intrusion prevention systems: Should enterprises deploy now? TAGS: | A little more than three years ago, I witnessed a pilot deployment of an intrusion prevention system (IPS) on a …Continue reading →

Default utility Image

Bringing the network perimeter back from the dead TAGS: | | With apologies to Samuel Clemens, the rumors of the perimeter’s death have been greatly exaggerated. I recently attended a conference …Continue reading →

Default utility Image

Don’t let trends dictate your network security strategy TAGS: | I recently came across a discussion group thread bemoaning the demise of host-based intrusion prevention systems (HIPS). One contributor heard …Continue reading →

Default utility Image

Maximizing IDS/IPS implementations TAGS: | | Anomaly detection is an important part of any layered security solution. Intrusion detection, intrusion prevention and log analysis systems can …Continue reading →

Default utility Image

Enterasys’s Dynamic Intrusion Response TAGS: | | Enterasys Networks’ development of its Dynamic Intrusion Response (DIR) platform leverages its strength as a network infrastructure products company and …Continue reading →