Saturday Jul 4

The Official RSA Conference Guide by Industry’s Top Snarkers

Friday, 27 March 2015 07:03

The Official RSA Conference Guide by Industry’s Top Snarkers

Sure, sure — you can check out the voluminous agenda and event catalogs detailing what you’ll find at RSA this year. But to get the real scoop on “where the world talks security”, you need an insider’s view, and the most accurate, full-featured, and entertaining take on the world’s largest security conference comes from us. Head over to the RSA Conference Blog site and soak in all the blogs you can find from the Securosis Team.

I’m delighted and honored to join my colleagues in contributing to this year’s conference Official (Unofficial) RSA Conference Guide. Like Rich said, I still can’t believe RSA gave us a mile-long leash; I’m looking around in disbelief, waiting for posts to disappear from the site.

Read more: The Official RSA Conference Guide by Industry’s Top Snarkers

InfoSec World- Best, Worst and Common Practices for Securing Enterprise WiFi

Monday, 23 March 2015 12:00

InfoSec World- Best, Worst and Common Practices for Securing Enterprise WiFi

The afternoon of Monday, March 23rd at InfoSec World in Orlando, I’ll be giving a talk in the mobile track titled “Best, Worst and Common Practices for Securing Enterprise WiFi“. Since the event site doesn’t post the full abstract, I figured I’d share it here for you, and I’ll tweet the crap out of it so you can find it.

Read more: InfoSec World- Best, Worst and Common Practices for Securing Enterprise WiFi

Your Favorite Speakers at Infosec World 2015

Sunday, 15 March 2015 10:45

Your Favorite Speakers at Infosec World 2015

Okay, in full disclosure this probably isn’t going to be a list of YOUR favorite speakers, but it’s a list of some friend, colleagues, and mentors you don’t want to miss at this year’s Infosec World.

A key to the session ID codes is below, and my favorite schedule format is their at-a-glance you can get here http://www.infosec-world.com/OS15_Grid_for_Web.pdf. Infosec World 2015 is March 23-25 at Disney’s Contemporary Resort in Orlando, FL.

In no particular order… Oh, actually these are mostly alphabetical by last name. Deviant’s at the top because I wanted that handsome devil above the crease. That, and he’s doing an opening keynote.

Read more: Your Favorite Speakers at Infosec World 2015

Diana Kelley: 3 Books that Changed My Life

Saturday, 14 March 2015 08:52

Diana Kelley: 3 Books that Changed My Life

In this series, I asked infosec professionals to name 3 books that changed their life. This entry features picks from Diana Kelley, an industry mover and shaker currently serving as an executive in IBM Security Systems.

If you looked at my profile and Diana’s side-by-side, you’d think we must run in the same circles – we’ve spoken at many of the same events, both serve as faculty at IANS, have written content for the same magazines. But the truth is I didn’t “find” Diana until some time last year, and it was purely by chance. She’s one of those extremely level-headed, fun, and energetic people that just has a magnetism you can’t resist and she’s a pure bottomless pit of positive professional energy. Going in to 2015, I look forward to connecting more with Diana. You can too, through the links at the bottom of this post.

Read more: Diana Kelley: 3 Books that Changed My Life

Jack Daniel: 3 Books that Changed My Life

Tuesday, 17 February 2015 08:59

Jack Daniel: 3 Books that Changed My Life

In this series, I asked infosec professionals to name 3 books that changed their life. This entry features picks from Jack Daniel, the self-proclaimed security curmudgeon and peer-described “glue” of our industry.

Perhaps best known as the co-founder of Security BSides, there are many accolades of Jack’s professional success, and I might say the more subtle, softer side of Jack is often overshadowed by his well-developed curmudgeonly persona. The short version is that he wins awards, does great things, helps lots of people, and will never turn a blind eye or hurried goodbye to a friend in need. He does all this while sporting an exceptionally long beard and skeptical brow, both of which he’s well known for.

Read more: Jack Daniel: 3 Books that Changed My Life

Wireless

Four Options for Secure Wireless Authentication with 802.1X
Four Options for Secure Wireless Authentication with 802.1X
Share
The use of 802.1X in wireless is currently the most widely accepted method for secure authentication and key exchange in enterprise environments.
More
The 4 Wireless Controller Architectures You Need to Know
The 4 Wireless Controller Architectures You Need to Know
Share

Here are the 4 wireless controller/management architectures you NEED to know, and an overview of what vendor solutions fall where.

More
Why more APs aren’t always better
Why more APs aren’t always better
Share
Lately, I’ve been forced to dispel a volume of wireless myths, both in way of technology and vendors. I’m not sure if it’s a full moon, or some other astrological occurrence, but it’s gotten a little crazy recently. So, I thought I’d take a few blog posts to address some wireless myths, in brief, to keep in the back of your head as you explore wireless solutions and upgrades in your environment. Here’s a thought on why more APs aren’t always better.
More
5 Classes of Wireless by Mission [Mgmt’s Guide to Wireless]
5 Classes of Wireless by Mission [Mgmt’s Guide to Wireless]
Share
Wireless can be broken down into five primary classifications, based on its mission. These are classifications I’ve defined for use in discussing wireless goals with customers.
More

Other Stuff

The Real Scoop on Multiple Device Auth with 802.1X
Share
Part I of the Clearing Up 802.1X Series Multiple Device Authentication and Mixed Authentication Pure vs Applied 802.1X There are a couple of issues mentioned in Mike’s and Richard’s posts  that I’d like to address with the current 802.1X standard (802.1X-2004) as it relates to multiple device authentication. More
Security Uncorked: Nominated for Security Bloggers Award
Share
I’m surprised and flattered that among the hundreds of SBN members, my blog was nominated with four others for a Social Security Award for 2010. Although I was at first a little befuddled by the non-technical category, I’m honestly just honored to be placed alongside the likes of ThreatPost, Schneier, Tao and Krebs. In addition to the ‘Best Non-Technical Security Blog’ there are four other categories and awards for bloggers and podcasters. More

Search

Get Social

RSSFacebookLinkedinYoutube

NetworkedBlogs

Subscribe

Enter your email address:

Delivered by FeedBurner