Information Security Leader, Author, Instructor and Speaker

Default utility Image

Five Ways to Protect Your Network TAGS: | | | | Criminals lurk behind many of the darker corners of the Internet, scouting out victims and eager to pounce when they …Continue reading →

Default utility Image

Detecting hack attacks: Application logging is critical TAGS: | | Application servers house a wealth of valuable data. They store your organization’s Web pages, serve as the gateway to critical …Continue reading →