Saturday Oct 21

Archive for the ‘NAC & 802.1X’ Category

Where to find JJ at RSA 2013 – NAC, certs, SBN and more
Last Updated on Tuesday, 19 February 2013 05:06
Written by jj
Tuesday, February 19th, 2013

Each year I like to share some of my where-abouts with you, and invite you to come say hello or join me in a session, discussion, debate or even a party. This year, I’m involved with two RSA sessions and some extra-curricular activities with organizations like TCG. Here’s the scoop! (more…)

Tags: , , , , ,   |  Posted under Events, NAC & 802.1X  |  Comments  No Comments
BYOD Articles, Opinions and Surveys
Last Updated on Wednesday, 7 March 2012 04:00
Written by jj
Wednesday, February 15th, 2012

I’ll be updating this page with BYOD resources I’ve found helpful, including media coverage, real war stories and results of surveys and statistics. We all love numbers, don’t we?


Tags: ,   |  Posted under NAC & 802.1X  |  Comments  1 Comment
Trusted Infrastructure at NSA’s Trusted Computing Conference
Last Updated on Tuesday, 31 January 2012 12:31
Written by jj
Friday, September 16th, 2011

Next week, I’ll be presenting on trusted infrastructure at the 2nd Annual NSA Trusted Computing Conference  in Orlando. This year’s focus is Using COTS technologies to deliver decisive defensive advantage. (more…)

802.1X-REV It’s a Cryptographic Come Back
Last Updated on Tuesday, 31 January 2012 12:32
Written by jj
Friday, September 16th, 2011

The new 802.1X-2010 (formerly referred to here as 802.1X-REV) offers a multi-faceted approach to increasing integrity, availability and confidentiality throughout network infrastructures at every segment- from LANs and WLANs to WANs and MANs. Yeah, I threw out the I.A.C. triangle. As much as I hate using it, it is a foundational element of security. (more…)

Tags: , , ,   |  Posted under NAC & 802.1X  |  Comments  2 Comments
Analysis after the demo: Hole 196 and the WPA2 vulnerability
Last Updated on Tuesday, 31 January 2012 01:10
Written by jj
Friday, July 30th, 2010

You guys asked me to break out this information instead of posting as comments on the original post.

Here is more updated information on the WPA2 Hole 196 vulnerability now that AirTight has given the demo at BlackHat/Defcon. (more…)

More Content

Find more of my content at
- Low Tech Hacking book
- Dark Reading
- Network Computing
- SearchSecurity
- TechTarget

Get Social



Enter your email address:

Delivered by FeedBurner