Brad Casey is a former SearchSecurity.com expert. He holds an MS in Information Assurance from the University of Texas at San Antonio, and has extensive experience in the areas of penetration testing, public key infrastructure, VoIP and network packet analysis. He is also knowledgeable in the areas of system administration, Active Directory and Windows Server 2008. He spent five years doing security assessment testing in the U.S. Air Force, and in his spare time, you can find him looking at Wireshark captures and playing with various Linux distros in VMs.
See below for Brad's archive of advice on network security.
Do you have a question for our experts?
Contributions from Brad Casey, Contributor
- Using Project Sonar to improve enterprise network security
- Why dead firewall rules can be your lifeline
- How DoD beefed up security with a trimmed-down network
- How to keep Wi-Fi network passwords secure
- Preparing for a firewall failure: Firewall best practices
- Will reputation-based security improve IPv6 security?
- The limitations of sandboxing in virtual environments
- Lessons learned from Cisco TelePresence default credential issue
- How can domain security services help the enterprise?
- Is it dangerous to overlap my traditional firewall with an NGFW?
- Should Lenovo computers be banned on corporate networks?
- Pay-as-you-go UTM: Does it make sense?
- What are the security issues with TCP/IP reassembly?
- How to protect IPMI-enabled systems from security vulnerabilities
- UTM vs. NGFW: Comparing features, use cases
- SSL monitoring: Criteria for an SSL decryption appliance
- Defending against the recent D-Link router backdoor
- Securing the network from Internet of Things issues
- Comparing mobile IDS/IPS vs. traditional IDS/IPS
- Are subscription-based penetration testing services beneficial?