Friday Jul 29

The Official RSA Conference Guide by Industry’s Top Snarkers

Friday, 27 March 2015 07:03

The Official RSA Conference Guide by Industry’s Top Snarkers

Sure, sure — you can check out the voluminous agenda and event catalogs detailing what you’ll find at RSA this year. But to get the real scoop on “where the world talks security”, you need an insider’s view, and the most accurate, full-featured, and entertaining take on the world’s largest security conference comes from us. Head over to the RSA Conference Blog site and soak in all the blogs you can find from the Securosis Team.

I’m delighted and honored to join my colleagues in contributing to this year’s conference Official (Unofficial) RSA Conference Guide. Like Rich said, I still can’t believe RSA gave us a mile-long leash; I’m looking around in disbelief, waiting for posts to disappear from the site.

Read more: The Official RSA Conference Guide by Industry’s Top Snarkers

InfoSec World- Best, Worst and Common Practices for Securing Enterprise WiFi

Monday, 23 March 2015 12:00

InfoSec World- Best, Worst and Common Practices for Securing Enterprise WiFi

The afternoon of Monday, March 23rd at InfoSec World in Orlando, I’ll be giving a talk in the mobile track titled “Best, Worst and Common Practices for Securing Enterprise WiFi“. Since the event site doesn’t post the full abstract, I figured I’d share it here for you, and I’ll tweet the crap out of it so you can find it.

Read more: InfoSec World- Best, Worst and Common Practices for Securing Enterprise WiFi

Your Favorite Speakers at Infosec World 2015

Sunday, 15 March 2015 10:45

Your Favorite Speakers at Infosec World 2015

Okay, in full disclosure this probably isn’t going to be a list of YOUR favorite speakers, but it’s a list of some friend, colleagues, and mentors you don’t want to miss at this year’s Infosec World.

A key to the session ID codes is below, and my favorite schedule format is their at-a-glance you can get here http://www.infosec-world.com/OS15_Grid_for_Web.pdf. Infosec World 2015 is March 23-25 at Disney’s Contemporary Resort in Orlando, FL.

In no particular order… Oh, actually these are mostly alphabetical by last name. Deviant’s at the top because I wanted that handsome devil above the crease. That, and he’s doing an opening keynote.

Read more: Your Favorite Speakers at Infosec World 2015

Diana Kelley: 3 Books that Changed My Life

Saturday, 14 March 2015 08:52

Diana Kelley: 3 Books that Changed My Life

In this series, I asked infosec professionals to name 3 books that changed their life. This entry features picks from Diana Kelley, an industry mover and shaker currently serving as an executive in IBM Security Systems.

If you looked at my profile and Diana’s side-by-side, you’d think we must run in the same circles – we’ve spoken at many of the same events, both serve as faculty at IANS, have written content for the same magazines. But the truth is I didn’t “find” Diana until some time last year, and it was purely by chance. She’s one of those extremely level-headed, fun, and energetic people that just has a magnetism you can’t resist and she’s a pure bottomless pit of positive professional energy. Going in to 2015, I look forward to connecting more with Diana. You can too, through the links at the bottom of this post.

Read more: Diana Kelley: 3 Books that Changed My Life

Jack Daniel: 3 Books that Changed My Life

Tuesday, 17 February 2015 08:59

Jack Daniel: 3 Books that Changed My Life

In this series, I asked infosec professionals to name 3 books that changed their life. This entry features picks from Jack Daniel, the self-proclaimed security curmudgeon and peer-described “glue” of our industry.

Perhaps best known as the co-founder of Security BSides, there are many accolades of Jack’s professional success, and I might say the more subtle, softer side of Jack is often overshadowed by his well-developed curmudgeonly persona. The short version is that he wins awards, does great things, helps lots of people, and will never turn a blind eye or hurried goodbye to a friend in need. He does all this while sporting an exceptionally long beard and skeptical brow, both of which he’s well known for.

Read more: Jack Daniel: 3 Books that Changed My Life

Wireless

Understanding collisions and duplex in wireless
Understanding collisions and duplex in wireless
Share
For whatever reason, we all seem to live with the delusion that wireless networking works like a wired connection, but over the air. And, in that world, we also have leprechauns. The truth is the layer 1 (physical) properties of wireless and RF are completely different;
More
Good, Bad and Ugly: On SecTor’s Wall of Shame
Good, Bad and Ugly: On SecTor’s Wall of Shame
Share
In the past 48 hours or so, rumours about the SecTor Wall of Shame have been circulating through the intertubes, blogs, twitter and exhibitor floor conversations.
More
Four Options for Secure Wireless Authentication with 802.1X
Four Options for Secure Wireless Authentication with 802.1X
Share
The use of 802.1X in wireless is currently the most widely accepted method for secure authentication and key exchange in enterprise environments.
More
Why more APs aren’t always better
Why more APs aren’t always better
Share
Lately, I’ve been forced to dispel a volume of wireless myths, both in way of technology and vendors. I’m not sure if it’s a full moon, or some other astrological occurrence, but it’s gotten a little crazy recently. So, I thought I’d take a few blog posts to address some wireless myths, in brief, to keep in the back of your head as you explore wireless solutions and upgrades in your environment. Here’s a thought on why more APs aren’t always better.
More

Other Stuff

Coming Up: NAC Sauces & 1X Vulnerabilities
Share
Per requests, and as part of the ‘ask JJ’ responses, I’ve been working on a couple of blog post series for you. I’m juggling blog-moving with blog-posting and trying to find the happy medium. Coming soon though, are two NAC/1X series I hope you’ll enjoy… More
NAC, Endpoint Security and Revelations from the RSA P2P
Share
I’m not going to recount what was said during the session; RSA’s Peer 2 Peer sessions are gracefully excused from the promiscuous ears of the media. I do, however, want to share a few thoughts, revelations and take aways I have from the session. More

Search

Get Social

RSSFacebookLinkedinYoutube

NetworkedBlogs

Subscribe

Enter your email address:

Delivered by FeedBurner