Information Security Leader, Author, Instructor and Speaker

Default utility Image

Firewall Architecture Tutorial TAGS: | Many network administrators have considered implementing dual firewalls. It is an expensive option, and the administrator who proposes the idea …Continue reading →

Default utility Image

Mobile device security in six simple steps TAGS: | | Two thousand six was the year of laptop theft. In February, a laptop was stolen from an Ernst & Young …Continue reading →

Default utility Image

Getting the best bargain on network vulnerability scanning TAGS: | How do you handle vulnerability scanning on your enterprise network? If you’re like many of your peers, you’ve either invested …Continue reading →

Default utility Image

Choosing the right firewall topology: Bastion host, screened subnet or dual firewalls TAGS: | When developing a perimeter protection strategy for an organization, one of the most common questions is “Where should I place …Continue reading →

Default utility Image

Auditing Firewall Activity TAGS: | In the first three parts of this series, we explored choosing a firewall platform, choosing an appropriate topology, and placing …Continue reading →

Default utility Image

Bringing the network perimeter back from the dead TAGS: | | With apologies to Samuel Clemens, the rumors of the perimeter’s death have been greatly exaggerated. I recently attended a conference …Continue reading →

Default utility Image

Troubleshooting proxy firewall connections TAGS: | With more proxy firewalls being placed between clients and servers, troubleshooting connectivity issues has become more complicated than in the …Continue reading →

Default utility Image

Network isolation as a PCI DSS compliance strategy TAGS: | The Payment Card Industry (PCI) Data Security Standard requires that merchants and service providers who store, process or transmit credit …Continue reading →

Default utility Image

Public wireless networks present a raft of dangers TAGS: | Most modern IT organizations have taken measures to fortify the corporate network against a variety of threats. Common setups often …Continue reading →

Default utility Image

Don’t let trends dictate your network security strategy TAGS: | I recently came across a discussion group thread bemoaning the demise of host-based intrusion prevention systems (HIPS). One contributor heard …Continue reading →