Wireless Segmentation Concepts: When, Why, and How

Required for security and compliance, segmentation is a major architecture element of a secure wireless network. Here’s an overview of when, why, and how to properly segment wireless including Wi-Fi, IoT, and private cellular.

MORE > Click the titl… Continue reading Wireless Segmentation Concepts: When, Why, and How

Zero Trust: Real-World Tactics and Strategies [BrightTalk On-Demand]

Much of my custom zero trust content isn’t publicly available. In this session, I was able to bring custom IANS content to the masses in the (ISC)2 Security Briefing webinar on BrightTalk. The live feedback was outstanding, and I hope you find it usefu… Continue reading Zero Trust: Real-World Tactics and Strategies [BrightTalk On-Demand]

Free Hands-On Hacking, Labs, and Other Hidden Gems of RSAC

I’ve been a member of the RSAC Program Committee for many years, but it still astounds me how many “hidden gems” and free hands-on labs are scattered throughout the agenda. Plus, learn more about supporting students and Team Rubicon.

MORE > Click t… Continue reading Free Hands-On Hacking, Labs, and Other Hidden Gems of RSAC

How to design architecture for enterprise wireless security [Free book excerpt]

You can access content from Chapter 5 “Planning and Design for Secure Wireless”, and learn my 5-phase design methodology for wireless network and security.

MORE > Click the title to read the full article.

Continue reading How to design architecture for enterprise wireless security [Free book excerpt]

Implementing wireless security in the enterprise [TechTarget Interview]

Learn how to properly secure your enterprise wireless network while considering UX, zero trust and commonly overlooked architectural mistakes. Download a free excerpt from the book.

MORE > Click the title to read the full article.

Continue reading Implementing wireless security in the enterprise [TechTarget Interview]

Zero Trust Product Suites and Enforcement Modes

In this short 15-minute session, you’ll learn about the broad product suite categories such as ZTNA, SASE, SWG, as well as the microsegmentation, and how each solution implements the zero trust security features.

MORE > Click the title to read the … Continue reading Zero Trust Product Suites and Enforcement Modes