Brad Casey is SearchSecurity.com’s resident expert on network security. He holds an MS in Information Assurance from the University of Texas at San Antonio, and has extensive experience in the areas of penetration testing, public key infrastructure, VoIP and network packet analysis. He is also knowledgeable in the areas of system administration, Active Directory and Windows Server 2008. He spent five years doing security assessment testing in the U.S. Air Force, and in his spare time, you can find him looking at Wireshark captures and playing with various Linux distros in VMs.
See below for Brad's archive of advice on network security. To submit a question for Brad, click on the "Ask a Question" tab above.
Do you have a question for our experts?
Contributions from Brad Casey, Network Security
- SSL monitoring: Criteria for an SSL decryption appliance
- Defending against the recent D-Link router backdoor
- Securing the network from Internet of Things issues
- Comparing mobile IDS/IPS vs. traditional IDS/IPS
- Are subscription-based penetration testing services beneficial?
- Cloud-based DDoS mitigation vs. in-house DDoS protection
- ISP services that will boost enterprise cybersecurity
- Defend against a network tap: Ensuring network traffic security
- Should a spike in TCP traffic with source port zero be a concern?
- Air gap systems: A practical advanced attack defense?
- Four need-to-know Wireshark features
- The enterprise IPS balancing act: Simplicity vs. granularity
- Continuous security monitoring: Learning from the Feds
- Is SSL-encrypted malware too much for next-gen firewalls?
- Are default passwords network security risks?
- How to mitigate Atlassian Crowd's SSO vulnerability
- The risks of granting admin rights for app management
- Using DNS monitoring to detect network breaches
- BYOPC: Security best practices for employee-owned computers
- What is the role of microVMs in malware detection?