Stay tuned for updated topics and content on:
- Wireless including Wi-Fi, Private Cellular/CBRS, and IoT
- Security policy including IoT, RF management, and BYOD
- Zero trust with real world how-to’s and getting started
- Mindfulness-based leadership topics
Categories
- Events73
- Industry Insider90
- J! True Stories12
- Mindfulness6
- Network Niblets30
- Random-izations52
- White Papers & Guides6
- Wireless38
- Zero Trust and NAC60
Recent Posts
- The First Wi-Fi Training and Certification Mini-EventNext month, Peter Mackenzie and I are co-hosting the first Wireless Tech Summit, a Wi-Fi training and certification mini-event. The best part? It will be in-person here in North Carolina! Okay, maybe that’s not actually the best part. The best part is probably the concept overall. We wanted to give people access to training and… Read more: The First Wi-Fi Training and Certification Mini-Event
- Democratized Security and the Role of Network AdminsI don’t believe there’s a heavy dividing line between networking and security. In fact, I think IT operations is, in fact, a critical part of cybersecurity, which means that every IT professional is also a security professional. Or, they should be. But, organizations often work in silos — sometimes loose constructs on an org chart,… Read more: Democratized Security and the Role of Network Admins
- How to Handle Rogue APs (Without getting arrested)One of the primary ways we’ve been handling rogues is in direct violation of the FCC regulations in the United States, and I’m told similarly illegal in other countries. Let’s be honest, you’re all too pretty for prison. So then, here’s how to handle rogues without getting arrested or paying fines. For the purposes of… Read more: How to Handle Rogue APs (Without getting arrested)
- My Return to Techno Security ConferenceI have a long history with the Techno Security Conference, thanks to my mentor and friend “Uncle” Jack Wiles. At one point, over 10 years ago, I was the conference’s youngest ever keynote speaker. It’s with great honor I return again this year to deliver a technical session on Zero Trust.
- Lynyrd Skynyrd Answers “Who Should Create an Org’s BYOD Policy?”The worst of LastPass’s year-long battle with an attacker occurred through a personal device, on a home network, putting BYOD back in the spotlight. And for the past three months, most boards, CIOs, and CISOs I know are taking the opportunity to reevaluate their Bring Your Own Device (BYOD) policies. Here, I answer, “Who should create an organization’s BYOD policies?”