Information Security Leader, Author, Instructor and Speaker

Default utility Image

The VPN Is Obsolete. Here’s What to Do Instead. TAGS: The virtual private network has been a vital enabler of remote work for decades. But the technology, invented in 1996, …Continue reading →

Default utility Image

3 Tips for Protecting a VPN in the Face of Major Vulnerabilities TAGS: | | Last year, the Department of Homeland Security issued a vulnerability notice that disturbed many in the cybersecurity community: Several popular …Continue reading →

Default utility Image

Managed Security Services in the Enterprise TAGS: | | | | Enterprises across a wide variety of industries are turning to cloud computing to reduce the burden on their IT support …Continue reading →