When Is a Business Ready for a Red Team Test?
TAGS: cybersecurity | cyberwarfare | network security | Red team Cybersecurity teams spend countless hours designing, implementing and managing security controls to protect against confidentiality, integrity and availability threats. Teams …Continue reading →
Wireshark tutorial: How to use Wireshark to sniff network traffic
TAGS: network security | Networking | Wireshark Wireshark continues to be one of the most powerful tools in a network security analyst’s toolkit. As a network packet …Continue reading →
Segment Your Campus Network for Stronger Security
TAGS: NAC | network security Campus networks carry almost every type of network traffic imaginable. Faculty and staff computers are similar to the devices in …Continue reading →
Next Generation Firewalls: The New Norm in Defense
TAGS: firewalls | network security | NGFW Increasingly sophisticated cyberattacks have led organizations to adopt correspondingly sophisticated levels of security control. Information security professionals now expect cyberattacks to be part …Continue reading →
Network Security: Get Certified!
TAGS: network security | security certification Network security professionals with proven skills can almost write their own job description. A shortage of networking professionals combined with …Continue reading →
WAFs, SDLC and PCI Compliance
TAGS: network security | web application firewalls | web security Web applications remain one of the most vulnerable parts of our computing infrastructure. We’ve taken extraordinary measures over the past …Continue reading →
Managing Network Firewalls: Taming the Beast
TAGS: firewalls | network security Network firewalls are one of the mainstay security controls that organizations around the world rely upon to protect our networks …Continue reading →
Building a Secure Wireless Network
TAGS: network security | wireless security TJX, the parent company of Marshalls, T.J. Maxx and other retailers,lost 45 million credit card numbers several years ago because …Continue reading →
NetFlow Security Monitoring for Dummies
TAGS: network security This book takes you through the basics of NetFlow analysis for information security purposes, including details on what NetFlow is, …Continue reading →
Stuxnet and the Advanced Persistent Threat
TAGS: APT | network security | Stuxnet The Michiana chapter of the Institute of Internal Auditors invited me to give a talk today for their CPE program …Continue reading →