Brad Casey is SearchSecurity.com’s resident expert on network security. He holds an MS in Information Assurance from the University of Texas at San Antonio, and has extensive experience in the areas of penetration testing, public key infrastructure, VoIP and network packet analysis. He is also knowledgeable in the areas of system administration, Active Directory and Windows Server 2008. He spent five years doing security assessment testing in the U.S. Air Force, and in his spare time, you can find him looking at Wireshark captures and playing with various Linux distros in VMs.
See below for Brad's archive of advice on network security. To submit a question for Brad, click on the "Ask a Question" tab above.
Do you have a question for our experts?
Contributions from Brad Casey, Network Security
- What is the role of microVMs in malware detection?
- Router, switch and firewall security: Protecting easy targets
- Is FTP malware threatening network port security?
- How to test network devices against brute forcing
- How to protect against firewall vulnerabilities
- Implications of mobile hotspot security vulnerabilities
- Effective layered security requires choosing the right layers
- Using OpenBL to improve firewall performance
- How to secure legacy serial port servers
- How effectively does an IPS detect APTs?
- Using customized firewall rule sets to support compliance
- Understanding the security benefits and risks of VDI
- The truth about HTTPS data decryption on mobile devices
- Evaluating NGFW management options: What to look for
- Integrating contextual security with network defense
- The role of sandboxing in advanced malware detection
- How to defend against an AET attack
- Do high-speed networks increase network security risk?
- Applying the Lockheed Martin cyber kill chain
- Juniper Junos flaw proves need to update network gear