Archive for June, 2008

What we’re reading, week of 6/30

Posted: 30th June 2008 by VPN Haus in Highlights

From Schneier on Security… Security and Human Behavior Bruce Schneier contributes this very thought-provoking post from the first “Security and Human Behavior” workshop, prompting a discussion of how perception and human psychology affect not only the way people assess their security, but the way security professionals devise solutions for problems. Schneier asserts that “[m]any real [...]

What we're reading, week of 6/30

Posted: 30th June 2008 by VPN Haus in Highlights

From Schneier on Security… Security and Human Behavior Bruce Schneier contributes this very thought-provoking post from the first “Security and Human Behavior” workshop, prompting a discussion of how perception and human psychology affect not only the way people assess their security, but the way security professionals devise solutions for problems. Schneier asserts that “[m]any real [...]

What we're reading, week of 6/23

Posted: 23rd June 2008 by VPN Haus in Highlights

From JJ’s Security Uncorked… Network Based Entitlement… A Rose by Any Other Name JJ reviews Rohati’s recently-announced “Network-based Entitlement Control,” drawing the conclusion that Rohati’s approach to NAC is no different than what can already be accomplished by traditional hardware solutions available.   From Emergent Chaos… Not quite clear on the subject This blogger corrects a [...]

What we’re reading, week of 6/23

Posted: 23rd June 2008 by VPN Haus in Highlights

From JJ’s Security Uncorked… Network Based Entitlement… A Rose by Any Other Name JJ reviews Rohati’s recently-announced “Network-based Entitlement Control,” drawing the conclusion that Rohati’s approach to NAC is no different than what can already be accomplished by traditional hardware solutions available.   From Emergent Chaos… Not quite clear on the subject This blogger corrects a [...]

Frank Cassano has written a series of posts at BlogInfoSec titled “Assessing Your Organization’s Network Perimeter” (see Part 1 and Part 2). We had a quick chat with NCP’s Rene Poot to get his perspective on Cassano’s analysis. Here’s what Rene had to say: What should be mentioned as (one of the many) details would [...]