Monday Sep 25

Posts Tagged ‘TechTarget’

Nov
29/10
Security School: Using IDS and IPS to meet business objectives
Last Updated on Monday, 29 November 2010 02:00
Written by jj
Monday, November 29th, 2010
Share

Hey everyone! Long time no see. I’m working up some recaps from Deep Sec in Vienna as well as a few 802.1X-2010 updates. In the meantime…

As promised, I’m letting you know about content I’ve done for Tech Target’s SearchSecurity site (publishers of Information Security Magazine).

Below is a link to the Security School I authored titled “Using IDS and IPS to meet business objectives“. Included in this Security School is the usual video, podcast and tech tip with BONUS quiz. w00t. We all love quizzes, don’t we? You might already know the answers to the questions; if not they’re all contained in the various parts of the school, if you can muddle through listening to my Southern accent for 15-20 minutes. Despite daily refutes, I keep telling myself I don’t have an accent. Apparently, I’m wrong.

Tech Target’s SearchSecurity.com
Security School: Using IDS and IPS to meet business objectives
http://searchsecurity.techtarget.com/guide/securitySchool/category/0,296296,sid14_tax317100,00.html

VIDEO – Meeting business goals with network security technologies
This video will discuss how moving from primary business functions to more detailed business tasks can help identify goals that network security can assist in meeting. 

PODCAST– Countdown: Top 5 ways to tune IDS/IPS to meet business needs
In this podcast, we’ll count down the top five ways to tune an IDS/IPS to make sure it’s meeting the business requirements you purchased it to meet. 

TECH TIP– IDS vs. IPS: How to know when you need the technology
IDS and IPS are useful security technologies, but how do you know whether your enterprise can benefit from one? In this tip, infosec pro Jennifer Jabbusch offers a few specific use cases to help you know when to consider… 

QUIZ: How IDS/IPS can enable business objectives
How much have you learned about integrating IDS/IPS with your enterprise’s business goals? Find out with this short quiz.

# # #

Tags: , , ,   |  Posted under Uncategorized  |  Comments  No Comments
Jul
03/09
Four Options for Handling Non-Compliant NAC Devices
Last Updated on Saturday, 28 January 2012 06:44
Written by jj
Friday, July 3rd, 2009
Share

Management is on board with your decision to roll out NAC, and your team is working diligently on a migration strategy. You have your organization’s policies clearly defined. You’re ready to create a set of recommendations for handling non-compliant devices and take them to management. Where do you start? (more…)

Tags: , ,   |  Posted under NAC & 802.1X  |  Comments  2 Comments
Jul
02/09
Handling the Politics of NAC Policies
Last Updated on Saturday, 28 January 2012 06:44
Written by jj
Thursday, July 2nd, 2009
Share

Network access control technologies are complicated enough to plan and implement on a technological level, but dealing with the politics of policies can be an entirely new headache your IT department never saw coming.

Conversations about NAC frequently start with basic information gathering: What features are you looking for? What operating systems and switches are in the environment? How do you want to handle non-compliant devices? And, of course, the sales guy will slip in the ol’ “What’s your budget?” line. (more…)

Tags: , ,   |  Posted under NAC & 802.1X  |  Comments  No Comments
May
24/09
IT Knowledge Exchange from Tech Target
Last Updated on Friday, 22 May 2009 04:39
Written by jj
Sunday, May 24th, 2009
Share

Much to my surprise and excitement while traveling back from INTEROP  this week, I learned the folks over at ITKE (IT Knowledge Exchange) at TechTarget selected my blog (http://SecurityUncorked.com) as their IT Blog of the Week.

I wasn’t familiar with ITKE, so I took a few minutes to check it out and found some nice information, posts and product reviews over there, as well as other featured blogs you should definitely check out, including:

If you find a few free moments, take a stroll through the listings and see if you find a few gems with content that solves a problem for you!

# # #

Tags: , ,   |  Posted under Industry Insider  |  Comments  No Comments

More Content

Find more of my content at
- Low Tech Hacking book
- Dark Reading
- Network Computing
- IANS
- SearchSecurity
- TechTarget

Get Social

RSSFacebookLinkedinYoutube

Subscribe

Enter your email address:

Delivered by FeedBurner

NetworkedBlogs