It wasn’t long after I switched from a long history of traditional cell phones to a BB Pearl that I realized there was a big problem. I was up a creek...
We were having some in-house training the other day and trying to demonstrate and explain the value of IT logging, event correlation and IT search functions to non...
What do you want to hear about? In addition to our Black Hat Blogging time between now and early August, I’m declaring June ‘Ask JJ’ month. I frequently get questions...
Now that we’ve started implementing NAC solutions with 802.1X, we (as an industry) have muddied the lines between the two technologies and even the software involved...
Just a quick note to all CISSPs, or other certification-holders from (ISC)2 (ISC)2 is taking a hard stand on CPE submissions and coming down heavy-handed on audits. If...