Democratized Security and the Role of Network Admins

I don’t believe there’s a heavy dividing line between networking and security. In fact, I think IT operations is, in fact, a critical part of cybersecurity, which means that every IT professional is also a security professional. Or, they sh… Continue reading Democratized Security and the Role of Network Admins

Zero Trust Product Suites and Enforcement Modes

In this short 15-minute session, you’ll learn about the broad product suite categories such as ZTNA, SASE, SWG, as well as the microsegmentation, and how each solution implements the zero trust security features.

MORE > Click the title to read the … Continue reading Zero Trust Product Suites and Enforcement Modes

Don’t be the #fail: Why ‘strategy’ should be your strategy for (ISC)2 elections

Once again, I bring you the unfiltered content of JJ’s mind through the blog-o-sphere. What I’m about to share are my opinions and do not represent those of anyone else on the board, near the board, under the board, at the organization or any any way affiliated with (ISC)2. My opinions are not always the […]

MORE > Click the title to read the full article.

Continue reading Don’t be the #fail: Why ‘strategy’ should be your strategy for (ISC)2 elections

The Official RSA Conference Guide by Industry’s Top Snarkers

Sure, sure — you can check out the voluminous agenda and event catalogs detailing what you’ll find at RSA this year. But to get the real scoop on “where the world talks security”, you need an insider’s view, and the most accurate, full-featured, and e… Continue reading The Official RSA Conference Guide by Industry’s Top Snarkers