Interview with Andrew G. Mason, author of "Cisco Secure Virtual Private Networks"
by Mirko Zorz - Monday, 21 April 2003.
The biggest challenge statistically is protecting your internal resources from internal users. People seem to always forget about protecting their systems from internal users. The easiest way to attack a companies electronic resources is to apply for a job within the company and attack them from the inside. More often than not, there is little if NO protection from internal users. It is important to create security zones and only give users access to the information they require.

What are your future plans? Any exciting new projects?

I have just finished the CCIE Practical Studies: Security book for Cisco Press. It is a hands-on based book for the Security CCIE lab exam. I am just starting work on the second edition of "Cisco Secure Virtual Private Networks". This new book is more focussed on the Cisco VPN 3000 range of products and covers them in far greater details than the old book did. I am also studying hard for the Security CCIE.

Spotlight

Free security software identifies cloud vulnerabilities

Posted on 21 October 2104.  |  Designed for IT and security professionals, the service gives a view of the data exchanged with partner and cloud applications beyond the network firewall. Completely passive, it runs on non-production systems, and does not require firewall changes.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Oct 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //