Information Security Leader, Author, Instructor and Speaker

Default utility Image

Wireshark tutorial: How to use Wireshark to sniff network traffic TAGS: | | Wireshark continues to be one of the most powerful tools in a network security analyst’s toolkit. As a network packet …Continue reading →

Default utility Image

Preparing for 802.11ac TAGS: | | Is your agency prepared for the next revolution in wireless networking? The traditional wireless networks that served agencies well for …Continue reading →

Default utility Image

The Future of Network Connectivity TAGS: Think for a moment about the network of the future and the services it will bring to your work environment. …Continue reading →

Default utility Image

Enterprise Network Forensic Analysis TAGS: | Your worst nightmare just became a reality. It’s 3:00 a.m., and your boss is on the phone telling you your …Continue reading →

Default utility Image

Network Access Considerations for Tablets TAGS: | Should we allow tablet computers on our corporate network? Over the next year, organizations that haven’t already answered this question …Continue reading →

Default utility Image

Are You Ready for IPv6? TAGS: | The world is running out of IP addresses — IPv4 addresses, that is. In January, the IANA (Internet Assigned Numbers …Continue reading →