TechTarget

I have written for TechTarget’s various online and print properties almost since they first began operations in 2000.

2013 articles

2012 articles

2011 articles

2010 articles

2007-9 articles

Earlier stories include 10 tips to protect your company in a down economy (2/09) which ran in Information Security magazine. (registration required). There is also a related webcast that was done in March that can be found here.

Here is a story on how to hire the best engineering talent for your Managed Service Provider that ran on SearchSecurityChannel.com. (9/07)

Product comparative reviews on SSL VPNs and UTM security appliances

I reviewed seven Unified Threat Management appliances for the June 2007 issue of Information Security magazine. (Here is the separate review of Secure Computing’s Sidewinder UTM box published in July 2007).

My biggest effort in the fall of 2006 was a review of five SSL VPNs for Information Security magazine, including the first comparison to include Cisco’s ASA 5540 product. The other products include Aventail’s ST EX-2500, F5 Networks’ FirePass 4100, Juniper Networks’ Secure Access (SA) 6000 SP and Check Point Software Technologies’ Connectra NGX R61. Juniper comes out on top.

Endpoint Security
In early November 2006, I wrote a story for SearchNetworking about questions you can ask your endpoint vendor about health assessment technologies. I also wrote a tip for SearchSecurity.com on how to configure the F5 Firepass and Juniper SSL VPNs for handling endpoint health assessment that ran in January 2007.

Information Security magazine articles on the topic include:

Webcasts and podcasts and speeches

I do a fair number of live seminars on a variety of topics. Here is a webcast called Network Access Control: Lessons Learned From the Front Lines in September 2008.

I also did the webcast “The Wide World of NAC and Endpoint Security” in January 2007.

I was part of a three-city seminar series that TechTarget put on in September 2006 on endpoint security and advanced identity management. Here is the full agenda.

And a webcast on logging and audit tools and techniques that came out in October 2007.

One thought on “TechTarget

  1. Hey Man I’d like to inquire about some of your consulting on a few revolutionary projects. I read your article “Master of your Cyber Domain” and found it to be very precise. I have about 100 domains now but a few real gems that Id like to chit chat with you about. Thanks Props on your site. Peace

    Jay

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s