This deep dive will explain filtering and segmentation, explore ways to enforce segmentation, and become familiar with the relationship of those options to our wireless...
Required for security and compliance, segmentation is a major architecture element of a secure wireless network. Here's an overview of when, why, and how to properly...
Much of my custom zero trust content isn't publicly available. In this session, I was able to bring custom IANS content to the masses in the (ISC)2 Security Briefing...
I've been a member of the RSAC Program Committee for many years, but it still astounds me how many "hidden gems" and free hands-on labs are scattered throughout the...
How to design architecture for enterprise wireless security [Free book excerpt]
You can access content from Chapter 5 "Planning and Design for Secure Wireless", and learn my 5-phase design methodology for wireless network and security.