Saturday Nov 29

JJ’s Top 10 Reasons to Vote in (ISC)2 Elections

Friday, 28 November 2014 10:06

JJ’s Top 10 Reasons to Vote in (ISC)2 Elections

Each year we go through the same cycle of love and hate during the annual (ISC)2 Board of Directors elections. Across the social media worlds, the apathy and frustration come head-to-head with excitement and hope. Disenfranchised members ask “why vote?” and “who cares?”, or make comments about how “nothing will change”. The more engaged crowd, led by hope and motivated by incremental change pushes for engagement and participation.

Read more: JJ’s Top 10 Reasons to Vote in (ISC)2 Elections

Give Back: Volunteer Training for Safe and Secure Online in NC December 2nd

Friday, 28 November 2014 09:00

Give Back: Volunteer Training for Safe and Secure Online in NC December 2nd

As a Board Member of not just (ISC)2, but also of the (ISC)2 Foundation, I’m very excited to share that (ISC)2 is offering a live, in-person Safe and Secure Online Volunteer Training right here in North Carolina on Tuesday, December 2nd. The training runs from 11am-2pm with a break for lunch. It’s definitely worth the drive from Greensboro, Winston-Salem, Raleigh, Sanford, Durham and even Charlotte and Greenville. These live trainings are typically only offered at large industry events such as the RSA Conference and Security Congress. As the event description notes, it really is a unique opportunity and I hope my colleagues in the area will join me in taking full advantage!

Read more: Give Back: Volunteer Training for Safe and Secure Online in NC December 2nd

Calling Bull$#** on Women in Infosec

Tuesday, 25 February 2014 10:11

Calling Bull$#** on Women in Infosec

Okay folks, I’m tired of hearing about “women in infosec” in its current topical form. I’ve stayed miles away from this topic for years, but now I’m going to speak up. And, to start the conversation, I call BULLSHIT. Not on the notion that we need more women in infosec, but on the methods, the justification and the explanation of why (or, lack thereof).  Hang tight for that one – the why – that’s coming in my next post.

Read more: Calling Bull$#** on Women in Infosec

JJ’s Sessions at RSA 2014- NAC, Mindfulness, Snowden and more

Friday, 21 February 2014 11:20

JJ’s Sessions at RSA 2014- NAC, Mindfulness, Snowden and more

Hey everyone, I know I’m a little behind getting my RSA Conference updates out, but, well, s#!7 happens! I hope you’ll accept my better-late-than-never post letting you know where I’ll be during this year’s RSA festivities. This year, be sure to check out the Neuro-hacking 101 session I’m presenting with Mike Rothman. I think it’s safe to say it’s one of the first (if not the only) of it’s kind for an infosec conference. Also, be sure to catch this year’s NAC P2P session. It always fill up quickly and this year we have a new twist.

Read more: JJ’s Sessions at RSA 2014- NAC, Mindfulness, Snowden and more

Calling All Infosec Curmudgeons at RSA

Friday, 21 February 2014 10:33

Calling All Infosec Curmudgeons at RSA

Well, that time is finally here, and in just a few days, Mike Rothman and I will be taking the stage at RSA 2014, in a room that seats 520 attendees, to discuss a topic never before breached at a security conference thus far. That’s 520 hearts and minds we have the opportunity to influence, but our goals aren’t so lofty. If we can open up just a handful of minds, that would be an amazingly gratifying experience. In fact, if the information we offer reaches just ONE of our infosec colleagues and offers a him or her a better life, well then, we’ll mark it as a success!

Realizing the descriptions provided in the booklets, and even online, are minimalist, (I guess that’s what’s expected at an event with 25+ tracks, hundreds of speakers and thousands of sessions) we thought you might like to know a little more about our strange little session on neurohacking and mindfulness. Specifically, we’ve received several questions about the appropriate colors of crystals to bring, and whether there will be Tarot cards available at the door. As it turns out, you guys are really funny, but there are no crystals or Tarot cards. Good one, though; that was very clever.

Read more: Calling All Infosec Curmudgeons at RSA

Wireless

Wireless: Using Light APs Across a WAN
Wireless: Using Light APs Across a WAN
Share
I get asked this question a lot….. “Can we have our wireless controller at the central office and APs at the other offices?” The answer to this is usually “yes and no”. I know, helpful, right?
More

Wireless for Beginners Part 1: RF and Waves
Share
This article by Jennifer Minella originally appeared in Network Computing. Wireless networking presents a unique set of challenges that have to be overcome to get information from point A to point B. Most of the quirkiness of wireless technologies has to do with the controls put in place to allow it to operate over the physical medium of the air. From collision avoidance to time slicing and even data rates, the functions and characteristics of wireless success (and failure) can most often be traced to the challenges of communicating over the air. This series starts with an overview of wireless’s most often-overlooked but fundamental elements: the properties of RF and waves. 
More

Get the Real Scoop on Dynamic Frequency Selection (DFS) and 802.11ac
Share
The wireless world has been abuzz with talk of Dynamic Frequency Selection (DFS) and the complications with adhering to the DFS requirements while deploying a 5GHz-only high-speed 802.11ac network. What is DFS? Why is DFS an issue? How does wireless impact radar, and vice versa? What are the added challenges when deploying 802.11ac WiFi? In my three-part series over at Network Computing, we take a dive in to these questions, and more.
More
A Brief History of Wireless Security
A Brief History of Wireless Security
Share
A Brief History of Wireless Security: Open, WEP, WPA, WPA2 & 802.1X
More

Other Stuff

Alan, Tim & 802.1X- 6 Reasons Why You’re Wrong
Share
I luv you’z guys and I usually agree with both of you on all matters NAC-ish and 1X-ish, but I have to disagree with today’s flurry of 802.1X-adoption talk. What exactly am I yapping about? Well, today Tim at Network World posted a nice article on the growing adoption of 802.1X. Shortly after, Alan jumped in with his post on ‘Is 802.1X in Your Future?’. You can see my notes below, and I definitely recommend reading the original articles. More
At RSA, we’re talking mindfulness and I’m scared sh**less
Share
Honestly, I’m scared shitless. Three months ago two people took an idea that had been brewing independently for years, and they made a commitment to it. Mike Rothman and I submitted a presentation topic we were certain would never make it to the ranks of the world’s largest security conferences. But it did. And so today, I’m overjoyed, a little relieved, excited at the opportunity, and yet at the same time a big piece of me is completely mortified. This talk, although founded in science, is a big lift of ol’ virtual skirt. It’s a talk about being happy, getting a grip on life, and using mindfulness to succeed and excel at everything you do. More

Search

Get Social

RSSFacebookLinkedinYoutube

NetworkedBlogs

Subscribe

Enter your email address:

Delivered by FeedBurner