Information Security Leader, Author, Instructor and Speaker

Default utility Image

Secure Your VPN, No Matter What TAGS: | Last year, the Department of Homeland Security issued a vulnerability notice that disturbed many in the cybersecurity community: Several popular …Continue reading →

Default utility Image

5 Security Must-Knows for Windows 10 TAGS: | | | Microsoft’s September release of the Windows 10 operating system caused a flurry of media activity centered around security and privacy …Continue reading →

Default utility Image

Virtual Private Networks TAGS: The explosive growth of mobile computing technology has dramatically changed the security landscape for organizations of all shapes and sizes.  …Continue reading →

Default utility Image

Don’t Be Afraid of that Coffee Shop Connection TAGS: | Right now, someone from your organization is sitting in a coffee shop, airport or hotel, taking advantage of a shared …Continue reading →

Default utility Image

Corrent VPN ‘connects’ with Check Point software TAGS: | | Corrent’s SR110 SSL VPN Web Security Gateway, an appliance running Check Point Software Technologies’ Connectra 2.0 SSL VPN software, offers …Continue reading →