From MFA to Zero Trust: A Five-Phase Journey to Securing the Workforce — An implementation roadmap and advice on measuring success along the journey to Zero Trust (Duo, 2021)
Passwordless: The Future of Authentication — The problem of passwords as primary authentication, the benefits and promise of passwordless, and the roadmap for implementing passwordless authentication. (Duo, 2020)
Zero Trust: Going Beyond the Perimeter — The fundamentals of a zero-trust approach to enterprise security. The three pillars of zero trust – workforce, workloads and workplace – and their difference. (Duo, 2019)
Vulnerability Management: A Maturity Approach — Implementing a program, realizing efficiencies through automating, and maturing vulnerability management. (VioPoint 2014)
Keys to a highly-efficient IT department — How to turn your IT department from a cost center to a business driver. (February 2014)
Secure Web Browsing in Public using Amazon — Using Amazon.com’s cloud services to create a free Web proxy for securely browsing the Internet from public Wi-Fi (July 2011)
Security System Design for Productivity — Measuring InfoSec productivity using the P>D+R formula, with techniques for improving detection time and accuracy (December 2009)
High Availability Branch Office VPN — step-by-step directions for implementing WatchGuard’s Firebox high availability feature (October 2007)
Performance of an Active Compellent San — real-world performance test results (June 2007)
Comparison of Novell, Polyserve, and Microsoft’s Clustering Performance — performance testing against file system clusters on a Compellent San (December 2006)
SmartSite: Integration Framework and Method — enterprise architecture for creating user-centric, service-centric networks (January 2002)
Linux Open Server for Workgroups — step-by-step directions on configuring Linux and open source software for your small business (August 2000)