-
Brad Casey is SearchSecurity.com’s resident expert on network security. He holds an MS in Information Assurance from the University of Texas at San Antonio, and has extensive experience in the areas of penetration testing, public key infrastructure, VoIP and network packet analysis. He is also knowledgeable in the areas of system administration, Active Directory and Windows Server 2008. He spent five years doing security assessment testing in the U.S. Air Force, and in his spare time, you can find him looking at Wireshark captures and playing with various Linux distros in VMs.
See below for Brad's archive of advice on network security. To submit a question for Brad, click on the "Ask a Question" tab above.
-
Do you have a question for our experts?
-
- Follow:
Contributions from Brad Casey, Network Security
- The role of sandboxing in advanced malware detection
- How to defend against an AET attack
- Do high-speed networks increase network security risk?
- Applying the Lockheed Martin cyber kill chain
- Juniper Junos flaw proves need to update network gear
- Does OpenFlow enable SDN security?
- Mega-DDoS attacks: A high-bandwidth high-wire act
- VPN use in China: Protecting sensitive business data
- I smell a RAT: Remote access Trojan detection tools
- Secure the back door on Barracuda security devices
- Mitigate wireless denial-of-service vulnerabilities
- How to keep Google from indexing your network printers
- Defining the benefits of a securely configured VLAN
- Gaging automatic IP addressing security repercussions
- Are VoIP phones still secure enough for enterprises?
- How often should firewalls be tested?
- UPnP protocol: A security issue for enterprises?
- How to defend against brute-force SSH attacks
- Is SSL decryption a viable network monitoring option?
- Analysis: What Gigabit Wi-Fi means for network security
Security Management Strategies for the CIO