Vendor-Neutral Security Videos and Whitepapers


Paper: Network Access Control (NAC) (April 23, 2022)

Video Version

Gaining access to a network should be more than forcing user and device authentication via credentials like user IDs, passwords, biometrics, and certificates. Network access control (NAC) extends access management to processes designed to assess the state of devices attempting access to a network. This assessment ensures that each device complies with a set of defined policies. NAC helps ensure that only devices hardened based on associated risk achieve resource access.


Paper: Use the Cyber Kill Chain for End-user Device Security (April 20, 2022)

Video Version

End-user devices are the greatest threat to network security, with a generally standard attack path depicted in the Lockheed Martin Cyber Kill Chain, as shown in Figure 1. Use of the kill chain helps identify risks against user devices, both mobile and static, by providing the threat actor's perspective. Breaking links in the chain hinders or prevents a threat actor from compromising a user device and using it as an attack pivot point.


Media Sanitization Guide (White paper, 2019)

Protecting sensitive information requires attending to where the information is located and used throughout its lifetime. This document guides how to manage sensitive information when the media on which it resides is no longer used for that purpose. These management processes are collectively known as media sanitization.

Media comes in several forms: magnetic, paper, solid-state, and optical. I address sanitization across all of these media types, including how to meet associated data erasure challenges. Further, this guide provides steps and considerations needed to implement and manage media sanitization policies and procedures.

Download paper


DNS Basics (Video)

This video explains and demonstrates how DNS works. This is helpful to prepare for my papers on DNS security.

Watch video at YouTube


DNS Cache Poisoning

There are several facets to DNS security. In this paper we focus on one of the most dangerous types of attack – DNS cache poisoning. To provide a complete picture of this threat, we’ll explore how DNS works, two ways crackers facilitate cache poisoning, what impact this type of attack can have on your organization, and steps you can take to protect your information assets

Download paper


DNS Tunneling Identification and Defense (White Paper, 2019)

Domain Name Service (DNS) traffic freely travels across network perimeters and internal network segments. Organizations cannot arbitrarily block this UDP port 53 traffic because doing so would break most, if not all, network communication. Malicious actors (MA) know this and have found ways to exploit DNS for their purposes.

One example of how MA exploit DNS is tunneling. DNS tunneling enables command and control (C2) and data exfiltration traffic for which most organizations do not look or are unable adequately to detect.

This paper helps organizations understand the threat and available defense solutions.

Download paper


Strengthen Security with an Effective Security Awareness Program

You’ve developed a world class security program. Your technology-based defenses are cutting edge. Your security team is well trained and ready to handle anything that comes its way. So you’re done, right? Not quite. One of the most important pieces of an effective information asset defense is missing – employee awareness.

In this paper, I define security awareness, list the objectives of an effective awareness program, and I step through a process to build, implement, and manage on-going support of the program

Download paper


Fundamentals of Storage Media Sanitization

One of the most fundamental principles of information security is that it’s all about the data. Data in transit or at rest is the primary focus of administrative, physical, and technical safeguards. Security professionals are doing better every day when it comes to protecting information in static production environments. But what happens when magnetic, optical, or semiconductor media is repurposed or retired?

In this paper, I define media sanitation and how it fits into an overall security program. Next, I examine how attackers can extract information from electronic media—even after it’s been overwritten. Finally, I explore ways you can protect your organization from attacks—both casual and highly motivated.

Download paper


Keystroke Dynamics: Low Impact Biometric Verification

Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However, user acceptance and cost issues often prevent organizations from adopting biometrics as a solution. This isn’t to say that other multifactor solutions are any less cost prohibitive. The capital expenditure and on-going maintenance costs of token-based systems are often higher than those for biometrics. Solutions based on keystroke dynamics might help meet these business challenges.

In this paper, I look at biometrics in general. This includes success factors for implementation and user acceptance. I also look at how the effectiveness of biometric solutions is measured. This is followed by an examination of keystroke dynamics technology, including its history, how it works, and why it may be the answer for organizations with people or cost issues.

Download paper