Publications

  • eSecurity Planet
    5 articles
  • Enterprise Storage Forum
    3 articles

Writes Most On

InformationSecurityCybersecuritySANCyberattackFibreChannelNetworkEngineerPentestingNetworkingNetworkSecurityEthicalHackingSystemAdministratorNetworkEngineersTransmissionControlProtocolITSecurityVirtualizedComponentsCommunicationProtocolSwissPeoplesPartyNetworkEngineeringITProfessionalSecurityHackerCRMEfficiencyContentRecommendationsEditoriallyIndependentEnterpriseCriticalApplicationsEaseOfManagementDifferencesAndSimilaritiesISCSIStorageResourcesSoftwareBasedInfrastructureHyperconvergedInfrastructureEaseOfDeploymentSecurityTeamsSolidstateDriveEncryptionDataProtectionRAIDApplicationSupportDataCenterHCIFlexibilityRedTeamVirtualizationTechnologyRansomwareStorageNetworkSmallOrganizationsHardDiskDriveTechnologyNuclearWeaponDesign
  • —eSecurity Planet
  • How to Get Started in Cybersecurity: Steps, Skills & Resources
    30 Jul 2024—eSecurity Planet
    Kickstarting a career in cybersecurity requires professionals to find opportunities, learn quickly, and adjust to a rapidly changing industry. While beginning this process can feel overwhelming, there are a variety of jobs and achievable steps you can take to make yourself a strong candidate. This guide to starting a career in cybersecurity walks you through those steps and helps you plan, gain practical experience, and make yourself a good hiring choice. Table of Contents Career Paths in...
  • How To Set Up DMZ on Servers: 7-Step DMZ Configuration
    30 Apr 2024—eSecurity Planet
    eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. A demilitarized zone (DMZ) network is a subnetwork that businesses use to protect their company’s local area network (LAN) and data from external sources. It’s important to prepare the network and firewalls in advance, then follow seven major steps to configure your DMZ’s protocols and rules. There are also some best practices for security...
  • Red Team vs Blue Team vs Purple Team: Differences Explained
    2 May 2024—eSecurity Planet
    eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. Red, blue, and purple teams are designated security sub-teams that simulate cyberattacks and responses to test an organization’s cybersecurity readiness. Red teams simulate or actually conduct pentesting and threat hunting attacks to test organizations’ security effectiveness. Blue teams defend organizations from attacks and simulate incident...
  • —eSecurity Planet