Security Uncorked

  • Home
  • About JJ
  • Books
  • Topics
    • Wireless
    • Zero Trust, NAC, and 802.1X
    • Network Niblets
    • Events
    • Random-izations
      • J! True Stories
      • Industry Insider
    • White Papers & Guides
  • My Schedule
  • Contact
  • ···
    • 0
      • No videos yet!

        Click on "Watch later" to put videos here

    Security Uncorked
    • Home
    • About JJ
    • Books
    • Topics
      • Wireless
      • Zero Trust, NAC, and 802.1X
      • Network Niblets
      • Events
      • Random-izations
        • J! True Stories
        • Industry Insider
      • White Papers & Guides
    • My Schedule
    • Contact
    • ···
      • 0
        • No videos yet!

          Click on "Watch later" to put videos here

      Security Uncorked
      • 0
        • No videos yet!

          Click on "Watch later" to put videos here

      • Home
      • About JJ
      • Books
      • Topics
        • Wireless
        • Zero Trust, NAC, and 802.1X
        • Network Niblets
        • Events
        • Random-izations
          • J! True Stories
          • Industry Insider
        • White Papers & Guides
      • My Schedule
      • Contact
      Wireless

      The 4 Wireless Controller Architectures You Need to Know

      November 30, 2011
      37 comments

      Here, I’ve outlined (with graphics) the 4 types of wireless controller systems that can be used to describe all types of products in the marketplace.

      Events, Zero Trust and NAC

      Trusted Infrastructure at NSA’s Trusted Computing Conference

      September 16, 2011

      Next week, I'll be presenting on trusted infrastructure at the 2nd Annual NSA Trusted Computing Conference in Orlando. This year's focus is Using COTS technologies to...

      Video
      Zero Trust and NAC

      802.1X-REV It’s a Cryptographic Come Back

      September 16, 2011
      2 comments

      The new 802.1X-2010 (formerly referred to here as 802.1X-REV) offers a multi-faceted approach to increasing integrity, availability and confidentiality throughout...

      Random-izations

      How a State Dept. contractor funneled $52 million to secret family

      July 20, 2011

      Simply amazing, I’m going to summarize this article here, and provide links to the original posting at the Daily Caller. Here’s what happened: A contracts...

      Random-izations

      Book Coming Soon: Low Tech Hacking (JJ)

      May 20, 2011

      I may have fallen off the blog radar for a bit, but I assure you it’s for good reason. Along with our annual IT Hot Topics Conference, wedding planning and...

      Previous 1 … 19 20 21 22 23 … 55 Next

      Search

      Let’s Connect!

      • twitter
      • linkedin
      • facebook
      • chrome

      Topics

      • Events73
      • Industry Insider90
      • J! True Stories12
      • Mindfulness6
      • Network Niblets30
      • Random-izations52
      • White Papers & Guides6
      • Wireless38
      • Zero Trust and NAC60

      Topics

      • Events
      • Industry Insider
      • J! True Stories
      • Mindfulness
      • Network Niblets
      • Random-izations
      • White Papers & Guides
      • Wireless
      • Zero Trust and NAC

      More Content

      Find more of my content at
      - "Wireless Security Architecture" book
      - Forbes Technology
      - "Low Tech Hacking" book
      - Dark Reading
      - Network Computing
      - IANS
      - SearchSecurity
      - TechTarget

      Recent Posts

      • The First Wi-Fi Training and Certification Mini-Event October 25, 2024
      • Democratized Security and the Role of Network Admins October 1, 2024
      • How to Handle Rogue APs (Without getting arrested) July 10, 2023

      Copyright © 2025. Find me at Mastodon