Sunday Nov 23

Calling Bull$#** on Women in Infosec

Tuesday, 25 February 2014 10:11

Calling Bull$#** on Women in Infosec

Okay folks, I’m tired of hearing about “women in infosec” in its current topical form. I’ve stayed miles away from this topic for years, but now I’m going to speak up. And, to start the conversation, I call BULLSHIT. Not on the notion that we need more women in infosec, but on the methods, the justification and the explanation of why (or, lack thereof).  Hang tight for that one – the why – that’s coming in my next post.

Read more: Calling Bull$#** on Women in Infosec

JJ’s Sessions at RSA 2014- NAC, Mindfulness, Snowden and more

Friday, 21 February 2014 11:20

JJ’s Sessions at RSA 2014- NAC, Mindfulness, Snowden and more

Hey everyone, I know I’m a little behind getting my RSA Conference updates out, but, well, s#!7 happens! I hope you’ll accept my better-late-than-never post letting you know where I’ll be during this year’s RSA festivities. This year, be sure to check out the Neuro-hacking 101 session I’m presenting with Mike Rothman. I think it’s safe to say it’s one of the first (if not the only) of it’s kind for an infosec conference. Also, be sure to catch this year’s NAC P2P session. It always fill up quickly and this year we have a new twist.

Read more: JJ’s Sessions at RSA 2014- NAC, Mindfulness, Snowden and more

Calling All Infosec Curmudgeons at RSA

Friday, 21 February 2014 10:33

Calling All Infosec Curmudgeons at RSA

Well, that time is finally here, and in just a few days, Mike Rothman and I will be taking the stage at RSA 2014, in a room that seats 520 attendees, to discuss a topic never before breached at a security conference thus far. That’s 520 hearts and minds we have the opportunity to influence, but our goals aren’t so lofty. If we can open up just a handful of minds, that would be an amazingly gratifying experience. In fact, if the information we offer reaches just ONE of our infosec colleagues and offers a him or her a better life, well then, we’ll mark it as a success!

Realizing the descriptions provided in the booklets, and even online, are minimalist, (I guess that’s what’s expected at an event with 25+ tracks, hundreds of speakers and thousands of sessions) we thought you might like to know a little more about our strange little session on neurohacking and mindfulness. Specifically, we’ve received several questions about the appropriate colors of crystals to bring, and whether there will be Tarot cards available at the door. As it turns out, you guys are really funny, but there are no crystals or Tarot cards. Good one, though; that was very clever.

Read more: Calling All Infosec Curmudgeons at RSA

JJ’s Complete Unofficial (ISC)2 Voter Guidebook

Saturday, 16 November 2013 01:01

JJ’s Complete Unofficial (ISC)2 Voter Guidebook

My friends, I’ve posted a lot of content about the ISC2 elections. Here’s a central reference point to reach all that content in an organized fashion. Remember, voting is open from November 16th through November 30th (specifically 5pm Eastern US).

Read more: JJ’s Complete Unofficial (ISC)2 Voter Guidebook

Your ISC2 Election Write-In Guide

Saturday, 16 November 2013 12:31

Your ISC2 Election Write-In Guide

As part of my Complete Unofficial Guide to ISC2 Elections, I’m offering you detailed instructions and a single reference point for all your write-in needs.

Read more: Your ISC2 Election Write-In Guide

Wireless

JJ’s RSA Session: Jumping Wireless Hurdles in the Enterprise
JJ’s RSA Session: Jumping Wireless Hurdles in the Enterprise
Share
Hi everyone, Long time, no blog. I know. But, I wanted to let you know I’ll be at RSA this week. Just in case you didn’t dig through the hundreds of sessions at RSA and realize I’d be hosting a Peer2Peer, here’s the info for you!
More

Get the Real Scoop on Dynamic Frequency Selection (DFS) and 802.11ac
Share
The wireless world has been abuzz with talk of Dynamic Frequency Selection (DFS) and the complications with adhering to the DFS requirements while deploying a 5GHz-only high-speed 802.11ac network. What is DFS? Why is DFS an issue? How does wireless impact radar, and vice versa? What are the added challenges when deploying 802.11ac WiFi? In my three-part series over at Network Computing, we take a dive in to these questions, and more.
More
Analysis after the demo: Hole 196 and the WPA2 vulnerability
Analysis after the demo: Hole 196 and the WPA2 vulnerability
Share
You guys asked me to break out this information instead of posting as comments on the original post. Here is more updated information on the WPA2 Hole 196 vulnerability now that AirTight has given the demo at BlackHat/Defcon.
More
The 4 Wireless Controller Architectures You Need to Know
The 4 Wireless Controller Architectures You Need to Know
Share

Here are the 4 wireless controller/management architectures you NEED to know, and an overview of what vendor solutions fall where.

More

Other Stuff

What is 802.1X? Here’s a Technology Primer for You
Share
I run into two fundamental problems when I start to talk to customers or audiences about Network Access Control and its related standards and protocols. What are they? Number 1, most folks have no clue what 802.1X actually is. Number 2, for the most part, they don’t really understand what NAC is either. More
Where to find JJ at RSA 2013 – NAC, certs, SBN and more
Share
Each year I like to share some of my where-abouts with you, and invite you to come say hello or join me in a session, discussion, debate or even a party. This year, I’m involved with two RSA sessions and some extra-curricular activities with organizations like TCG. Here’s the scoop! More

Search

Get Social

RSSFacebookLinkedinYoutube

NetworkedBlogs

Subscribe

Enter your email address:

Delivered by FeedBurner