Saturday Jan 20

Posts Tagged ‘network security’

Retaliation: Network Security Talk at SecTor
Last Updated on Saturday, 28 January 2012 06:42
Written by jj
Wednesday, September 30th, 2009

Now that I have all the important fun stuff out there for you on Why You Can’t Miss SecTor, I’ll tell you a little bit about my talk at the conference.

My talk this year is different- it’s different from my talk last year at SecTor (Network Security Stripped) and it’s actually a stark contrast to the majority of my past talks. (more…)

Network Security on a Budget: Video, Podcast and Tips
Last Updated on Monday, 17 August 2009 04:13
Written by jj
Monday, August 17th, 2009

Recently, I worked with the Tech Target team on content for the Network Security School for midmarket organizations. In this Midmarket Security School set, you’ll find tips and tricks on how to streamline your network security budget, retool the infrastructure for security and my personal list of top five security issues to avoid.

Find the video, podcast and top five tips at Search Midmarket Security.

Streamlining your network security infrastructure  – VIDEO
Learn how to save money by streamlining your network security infrastructure.
   1. Retooling the infrastructure for security
   2. Identifying and classifying tools and resources
   3. Leveraging your current personnel, experience and interests
   4. Exploring uncommon uses for software and hardware
   5. Reviewing overlooked functions of switches, routers and firewalls
   6. When shoestrings aren’t enough
How to rework your network infrastructure for security  – TIPS
NEW! Retooling your existing network infrastructure for security requires less complexity and more attention to basics such as switches, centralized authentication, UTMs and network segmentation.

Five network security issues to avoid  – PODCAST
NEW! This podcast covers some common network security issues and how you can go about avoiding them in your organization.
1. The management malady
   2. Partial lockdown
   3. Documentation
   4. Cutting with a spoon
   5. Vendor voo doo

If you get tired of listening to me after a couple of minutes, you can find more Midmarket Security School content online.



# # #

The 802.1X Hat-Trick
Last Updated on Wednesday, 20 November 2013 12:42
Written by JJ
Monday, June 30th, 2008

Well my recent blogging, or lack there of, may have clued you in on my recent hectic travel schedule. It’s June, and that means the end of government’s fiscal year, so we’ve been busy little bees at the office. (Read my primer on 802.1X here.) (more…)

Tags: , ,   |  Posted under NAC & 802.1X  |  Comments  Comments Off on The 802.1X Hat-Trick
The First 802.1X Training?
Last Updated on Saturday, 28 January 2012 07:01
Written by JJ
Tuesday, June 10th, 2008

Well, we may just have the first ‘official’ dedicated 802.1X Training.

We may not… but after extensive Google searches, all I’ve been able to find are white papers, implementation guides and some classroom training on wireless security with mention of 802.1X. (more…)

Tags: , , , ,   |  Posted under NAC & 802.1X  |  Comments  Comments Off on The First 802.1X Training?
Top 5: Why Customers Consider NAC
Last Updated on Saturday, 28 January 2012 07:02
Written by JJ
Saturday, May 31st, 2008

On a daily (and nightly) basis I have the wonderful experience of talking to, chatting about, presenting on or asking questions of customers about NAC.

At each of these opportunities, I like to ask ‘Why are you considering NAC?” (more…)

More Content

Find more of my content at
- Low Tech Hacking book
- Dark Reading
- Network Computing
- SearchSecurity
- TechTarget

Get Social



Enter your email address:

Delivered by FeedBurner