I have a long history with CMP Media, then called United Business Media, now Informa — having worked at four full-time editorial positions. In 2013-2014, I wrote for one of their blogs called Solution Providers for Retail, how the channel can help retail businesses with their technology needs. Sadly, the blog has been since retired.
Earlier, I wrote a few pieces for a blog of Dr. Dobbs called Develop in the Cloud, mostly on app dev topics; and others for Internet Evolution. Those posts are gone to the sands of time too.
A few years ago I wrote a series of freelance pieces for InformationWeek.com. Most of these are also gone.
- Top disruptive techs for 2008 (1/3/08)
- Top tips for securing your laptop (11/24/07)
- Five networking pet peeves (7/9/07)
- How to get started with Web 2.0 (6/4/07)
- Six decisions to deploy endpoint security (4/24/07)
- Microsoft Still Trying to Get Open Source (4/4/07)
- The growing need for personal firewalls (3/24/07)
- How To Protect Your Precious PC Data: From Physical Security To Encryption (2/10/07)
- Five disruptive techs to watch in 2007 (1/2/07)
- Group chat evolving into E-Mail 2.0 (12/7/06)
- Web 2.0 makeover strategies (11/28/06)
My first position with CMP was the founding editor-in-chief to launch Network Computing magazine back in the summer of 1990 — good times. (Here is a guest column that I wrote in 2000 on the magazine’s 10th anniversary.) My most recent article was Freddie Mac cashes in on Web services (9/18/06), a case study on the financial services firm.
In the fall of 2004, I worked for the Electronics Group and help launch a series of Web sites aimed at electronics designers under the DesignLine.com label, and hired its first staff of site producers. Finally, I started doing freelance work for VAR Business in 2000, and worked full-time as their Technology Editor during 2002-2004. Here is a page of the highlights from that era. (Some of these links are outdated.)
In 2025, Informa merged with Techtarget. I have written for TechTarget’s various online and print properties almost since they first began operations in 2000. A lot of my old content has been removed. Here you can quickly find everything that I have written for their various properties.
2018 articles
I wrote a series of sponsored white papers on ransomware that were posted in May.
2015 articles
- Virtualization security tools defend across clouds (Search Security, 12/15)
- Emerging security threats you are up against now (SearchSecurity, 10/15)
- Managing hybrid cloud security (SearchSecurity, 9/15) (3 articles)
- Multifactor authentication: A buyer’s guide to MFA products (SearchSecurity, 5/15)
- Six questions to ask your BYOD supplier (SearchSecurity 5/15)
- The moving target defense and polymorphic security (SearchSecurity 5/15)
- The new network edge (SearchSecurity, 5/15) and video slideshow
- The evolution of security tokens (SearchSecurity, 3/15)
- A closer look at ‘good enough’ security (SearchSecurity, 3/15)
- Making single sign-on simple and secure (SearchSecurity, 3/15)
2014 articles
- The fundamentals of MFA: Multifactor authentication in the enterprise (SearchSecurity, 10/14- 12/14)
- Things to watch when buying UTM products (SearchSecurity, 6/14)
- Cyberthreat intelligence is getting crowded (InfoSec Mag, 6/14)
- Protecting mission critical data using disaster recovery (webinar for Modern Infrastructure University, 5/14, click DR, VMs heading, and then the title of the talk)
- Figuring Out FIDO (articles and webinar, SearchSecurity and InfoSec Mag, 5/14)
- The Changing Face of Advanced Malware Detection (SearchSecurity, 1/14)
2013 articles
- UTM Screencast review (SearchSecurity, 12/13)
- Enterprise password managers (SearchSecurity, 11/13)
- Next-generation Firewalls Play by New Rules (article, webcast, supplemental article, 9/13)
- The Hyperscale Data Center (Modern Infrastructure, 7/13)
- Affordable disaster recovery in the cloud (Bitpipe, 5/13) (webinar)
- Status report on 40 GB Ethernet (Modern Infrastructure, 1/13)
2012 articles
- The promise of software defined networking (Modern Infrastructure, 11/12)
2011 articles
- Preparing for a hybrid cloud move (SearchCloudComputing, 5/17/11)
- Summer reading list for geeks (SearchEnterpriseDesktop, 6/25/11)
- Shopping around for cloud computing services (SearchCloudComputing, 5/10/11)
- Basics of Social Media in the Enterprise (SearchEnterpriseDesktop , 4/7/11)
- How Cloud Computing Kills Clusters (SearchCloudComputing, 4/19/11)
- Securing VMs in the Cloud (SearchCloudComputing, 4/4/11)
- Does Microsoft Kinect have a role in the enterprise? (SearchEnterpriseDesktop, 1/26/11)
- Virsto One for capacity management (SearchServerVirtualization, 1/11/11)
- Connecting to remote servers in the cloud (SearchCloudComputing, 1/13/11)
- Virtual machine management with Virsto One (SearchServerVirtualization, 1/11/11)
- Virtual machine security: A look at HyTrust Appliance (SearchVMware, 1/11/11)
2010 articles
- Top 10 best/worst desktop developments for SearchEnterpriseDesktop (12/10)
- Twitter-like tools for behind the corporate firewall for SearchEnterpriseDesktop) (11/10)
- New virtualization tools from Hytrust and Virsto for SearchServerVirtualiztion)
- Microsoft Business Productivity Online Suite update (10/10) for SearchSystemsChannel
- Windows Intune review for SearchVirtualDesktop (10/10)
- P2V Migration tools for SearchVirtualDesktop (9/10)
- Blocking USB access for SearchEnterpriseDesktop.com (9/10)
- Running IEv6 on a Windows 7 desktop for SearchVirtualDesktop.com (8/10)
- Controlling Facebook apps across the enterprise for SearchEnterpriseDesktop.com (8/10)
- Cloud AV products reviewed for SearchVirtualDesktop.com (6/10)
- Seven considerations when evaluating GRC tools (7/10) for SearchFinancialSecurity.com
- Understanding Windows 7 migration tools (5/10) for SearchEnterpriseDesktop.com
- Sysinternals Process Monitor and Process Explorer (6/10) for SearchEnterprise Desktop.com
2007-9 articles
Earlier stories include 10 tips to protect your company in a down economy (2/09) which ran in Information Security magazine. (registration required). There is also a related webcast that was done in March that can be found here.
Here is a story on how to hire the best engineering talent for your Managed Service Provider that ran on SearchSecurityChannel.com. (9/07)
Product comparative reviews on SSL VPNs and UTM security appliances
I reviewed seven Unified Threat Management appliances for the June 2007 issue of Information Security magazine. (Here is the separate review of Secure Computing’s Sidewinder UTM box published in July 2007).
- I also wrote a tip for SearchSecurity.com about what is involved in setting up unified threat management products from CheckPoint, Sonicwall, and Fortinet here.
- I did this animated voice-over screencast that shows how to setup the Sonicwall UTM 5060 box.
- And I also wrote a short piece on how the channel can sell UTM products and services for SearchSecurityChannel.com here.
My biggest effort in the fall of 2006 was a review of five SSL VPNs for Information Security magazine, including the first comparison to include Cisco’s ASA 5540 product. The other products include Aventail’s ST EX-2500, F5 Networks’ FirePass 4100, Juniper Networks’ Secure Access (SA) 6000 SP and Check Point Software Technologies’ Connectra NGX R61. Juniper comes out on top.
Endpoint Security
In early November 2006, I wrote a story for SearchNetworking about questions you can ask your endpoint vendor about health assessment technologies. I also wrote a tip for SearchSecurity.com on how to configure the F5 Firepass and Juniper SSL VPNs for handling endpoint health assessment that ran in January 2007.
Information Security magazine articles on the topic include:
- NAC Tales (Sep 2008), case studies of four different businesses and how they did NAC
- Tip on how to deploy Windows Server 2008 using NAP (Sep 2008)
- The Sting (Nov 2007), looking into honeyclients
- Log Wild (Oct 2007), about log management strategies, and a companion story illustrating log filtering using the NetIQ products on SearchSecurity.com
- Which Way? (April 2006) and Who’s There (below, registration required).
- Who’s there, (Jan 2007) more on figuring out the right endpoint security product
- Fraud Busters, (Jan 2007) about the vendors that help implement better multi-factor authentication systems.
Webcasts and podcasts and speeches
I do a fair number of live seminars on a variety of topics. One is a webcast called Network Access Control: Lessons Learned From the Front Lines in September 2008.
I also did the webcast “The Wide World of NAC and Endpoint Security” in January 2007.
I was part of a three-city seminar series that TechTarget put on in September 2006 on endpoint security and advanced identity management.
And a webcast on logging and audit tools and techniques that came out in October 2007.