Wireless networking is terrific. I have the freedom to work on the Internet anywhere around my office or even outside on my porch. I do not worry about drilling holes in my walls or fishing wires.
This article originally appeared in the April 2020 issue of Security Business magazine. When sharing, don’t forget to mention @SecBusinessMag! Network segmentation is the security integrator’s first ...
In this article, we examine how security applies to Service Oriented Architecture (SOA). Before we discuss security for SOA, lets take a step back and examine what SOA is. SOA is an architectural ...
A number of pieces about the legacy of President Obama’s Cybersecurity Coordinator CIO Howard Schmidt have already been written, but none that I’ve read talk about what I believe every enterprise ...
• Understand clearly which security functions you need. Don’t expect a service provider to tell you what you need to know. • Make sure someone on your staff knows at least the technical basics of ...
Network forensics is the process of capturing, storing and analyzing activity that takes place on a computer network. While it’s often associated with solving network security breaches, the practice ...
I like classes. If I could be a professional student, I would. I was a teacher, so book learning has great value to me as does learning in a classroom. Take that for what it’s worth as it doesn’t ...