Information Security Leader, Author, Instructor and Speaker

Default utility Image

When Is a Business Ready for a Red Team Test? TAGS: | | | Cybersecurity teams spend countless hours designing, implementing and managing security controls to protect against confidentiality, integrity and availability threats. Teams …Continue reading →

Default utility Image

Wireshark tutorial: How to use Wireshark to sniff network traffic TAGS: | | Wireshark continues to be one of the most powerful tools in a network security analyst’s toolkit. As a network packet …Continue reading →

Default utility Image

Segment Your Campus Network for Stronger Security TAGS: | Campus networks carry almost every type of network traffic imaginable. Faculty and staff computers are similar to the devices in …Continue reading →

Default utility Image

Next Generation Firewalls: The New Norm in Defense TAGS: | | Increasingly sophisticated cyberattacks have led organizations to adopt correspondingly sophisticated levels of security control. Information security professionals now expect cyberattacks to be part …Continue reading →

Default utility Image

Network Security: Get Certified! TAGS: | Network security professionals with proven skills can almost write their own job description. A shortage of networking professionals combined with …Continue reading →

Default utility Image

WAFs, SDLC and PCI Compliance TAGS: | | Web applications remain one of the most vulnerable parts of our computing infrastructure.  We’ve taken extraordinary measures over the past …Continue reading →

Default utility Image

Managing Network Firewalls: Taming the Beast TAGS: | Network firewalls are one of the mainstay security controls that organizations around the world rely upon to protect our networks …Continue reading →

Default utility Image

Building a Secure Wireless Network TAGS: | TJX, the parent company of Marshalls, T.J. Maxx and other retailers,lost 45 million credit card numbers several years ago because …Continue reading →

NetFlow Security Monitoring for Dummies TAGS: This book takes you through the basics of NetFlow analysis for information security purposes, including details on what NetFlow is, …Continue reading →

Default utility Image

Stuxnet and the Advanced Persistent Threat TAGS: | | The Michiana chapter of the Institute of Internal Auditors invited me to give a talk today for their CPE program …Continue reading →