Information Security Leader, Author, Instructor and Speaker

Default utility Image

3 Tips for Protecting a VPN in the Face of Major Vulnerabilities TAGS: | | Last year, the Department of Homeland Security issued a vulnerability notice that disturbed many in the cybersecurity community: Several popular …Continue reading →

Default utility Image

How to Choose Between Penetration Tests and Vulnerability Scans  TAGS: | Even seasoned cybersecurity professionals confuse penetration tests with vulnerability scans. Both play an important role in the security practitioner’s toolkit, but …Continue reading →

Default utility Image

IT and End of Life Issues TAGS: | | Organizations around the world have extremely complex technology environments that depend upon many different components to function properly. Operating systems, …Continue reading →

Default utility Image

Vulnerability Assessments Reveal Security Weaknesses TAGS: | How confident are you that your network is secure and that hackers aren’t lurking on a server, lying in wait …Continue reading →

Default utility Image

Choose the Best Vulnerability Assessment Tools TAGS: | Security vulnerabilities exist in every organization. The sheer volume of operating system, application and infrastructure security alerts announced each day …Continue reading →

Default utility Image

Tech Tips: Running a Vulnerability Scan TAGS: Vulnerability scanning plays a critical role in the information security program of any educational institution. Conducting regular security scans ensures …Continue reading →

Default utility Image

Five Ways to Protect Your Network TAGS: | | | | Criminals lurk behind many of the darker corners of the Internet, scouting out victims and eager to pounce when they …Continue reading →

Default utility Image

Can open source solve PCI compliance problems? TAGS: | | | Open source software provides organizations with a community-developed, inexpensive alternative to commercial products. Many enterprises have turned to open source …Continue reading →

Default utility Image

What Security Vulnerabilities Should Be Fixed First? TAGS: | | Enterprises who begin a vulnerability management program often find themselves quickly faced with an intimidating avalanche of data. Scan results …Continue reading →

Default utility Image

Vulnerability Management In the Cloud TAGS: | As the security industry slowly moves toward the adoption of managed security service providers (MSSPs), one particular area is gaining …Continue reading →