Information Security Leader, Author, Instructor and Speaker

Default utility Image

Segment Your Campus Network for Stronger Security TAGS: | Campus networks carry almost every type of network traffic imaginable. Faculty and staff computers are similar to the devices in …Continue reading →

Default utility Image

Network Access Control: Handling Smartphones TAGS: | From iPhone, to Droid, to BlackBerry, to Nexus One, it seems a new mobile device is born every week and …Continue reading →

Default utility Image

Network access control technology: Over-hyped or under-used? TAGS: | | Over the past two years, network access control (NAC) technology has reached full-fledged buzzword status within the information security community. …Continue reading →

Default utility Image

Podcast: Making NAC work with your existing security tools TAGS: | This podcast provides listeners with real-world anecdotes and detailed information on how to overcome obstacles presented by conflicts between your …Continue reading →

Default utility Image

Microsoft NAP/TNC alliance brings new dimension to network access control decisions TAGS: | | Network access control (NAC) systems provide information security teams with a valuable weapon in the endpoint security war. This is …Continue reading →