Information Security Leader, Author, Instructor and Speaker

Default utility Image

Wired vs. wireless network security: Best practices TAGS: | | Just about every organization today offers some sort of wireless connectivity in the workplace; it is far too powerful a …Continue reading →

Default utility Image

Building a Secure Wireless Network TAGS: | TJX, the parent company of Marshalls, T.J. Maxx and other retailers,lost 45 million credit card numbers several years ago because …Continue reading →

Default utility Image

WiFi Hotspot Risks TAGS: Do you lay awake at night wondering about the security of mobile computer users accessing WiFi hotspots around the world? …Continue reading →

Default utility Image

WPA security: Enabling the best WiFi security for SMBs TAGS: Most security professionals understand the risks posed by wireless networking and that using Wi-Fi Protected Access (WPA or WPA2) is …Continue reading →

Default utility Image

How to change from WEP to WPA for PCI DSS compliance TAGS: | The clock is ticking! June 30, 2010 is the deadline for companies required to comply with the Payment Card Industry …Continue reading →

Default utility Image

Cracks in WPA? How to continue protecting Wi-Fi networks TAGS: | Frequent readers of my tips know I haven’t been afraid to pull out my soapbox and rant about the inherent …Continue reading →

Default utility Image

WEP to WPA: Wireless encryption in the wake of PCI DSS 1.2 TAGS: | The PCI Security Standards Council recently announced the imminent release of the Payment Card Industry Data Security Standard (PCI DSS) …Continue reading →

Default utility Image

Worst practices: Encryption conniptions TAGS: | Here at SearchSecurity.com, we writers spend a great deal of time and energy helping information security professionals explore new security …Continue reading →

Default utility Image

Lessons learned from TJX: Best practices for enterprise wireless encryption TAGS: Between July 2005 and January 2007, TJX Companies Inc. suffered one of the largest data security breaches in the history …Continue reading →

Default utility Image

Public wireless networks present a raft of dangers TAGS: | Most modern IT organizations have taken measures to fortify the corporate network against a variety of threats. Common setups often …Continue reading →