Friday Jun 23

Posts Tagged ‘Catching the Unicorn’

Mar
08/10
Universal NAC Feature Model document
Last Updated on Saturday, 28 January 2012 06:37
Written by jj
Monday, March 8th, 2010
Share

Universal NAC Feature Model document: 
A guide to model and compare NAC solutions (more…)

Feb
25/10
RSA Sneak Peek: The Universal NAC Feature Model doc
Last Updated on Saturday, 28 January 2012 06:39
Written by jj
Thursday, February 25th, 2010
Share

As I’ve announced earlier, during the P2P session I’m hosting at RSA on Endpoint Integrity and NAC, I’ll be releasing for the first time ever our Universal NAC Feature Model. The contents of which include a prettied-up version of our proprietary internal document outlining and describing the feature components of NAC (as described in my recent whitepaper Catching the Unicorn) as well as the vendor mechanics implemented by different solutions to offer those features. (more…)

Sep
18/09
NAC document finally released: Catching the Unicorn
Last Updated on Saturday, 28 January 2012 06:42
Written by jj
Friday, September 18th, 2009
Share

Finally!

Many of you know I’ve been working on this document for the better part of a year now. The concepts and ideas came together quickly during a flight from the West coast, but transforming all the thoughts to a cohesive document for a broader audience has taken a lot of time and help.

Don’t be put off by the name. Believe it or not, the title has an actual meaning. I hope you’ll read the first pages of the document to understand where the title came from and why it’s relevant. (more…)

Sep
18/09
Catching the Unicorn: A technical exploration of why NAC is failing
Last Updated on Saturday, 28 January 2012 06:42
Written by jj
Friday, September 18th, 2009
Share

Catching the Unicorn:
A technical exploration of why NAC is failing (more…)

Jul
22/09
Security B-Sides Conference in Vegas
Last Updated on Saturday, 28 January 2012 07:06
Written by jj
Wednesday, July 22nd, 2009
Share

I’m not sure exactly how this all came to be. I can tell you somewhere along the way, several tweets were flying about a variety of Black Hat presentations turned down this year from pretty prominent speakers. (Mine was turned down as well, although I’m definitely not going to group myself in the prominent speakers category.) Public tweets turned in to private messages amongst several of us. I went to bed that night and when I woke up, some magical hamsters running this wheel had pulled together a killer idea, a web site and were working on the supporting structure of the event’s logistics – location, space, transportation, sponsors. (more…)

More Content

Find more of my content at
- Low Tech Hacking book
- Dark Reading
- Network Computing
- IANS
- SearchSecurity
- TechTarget

Get Social

RSSFacebookLinkedinYoutube

Subscribe

Enter your email address:

Delivered by FeedBurner

NetworkedBlogs