J Wolfgang Goerlich's thoughts on Information Security


Keys to a highly-efficient IT department -- How to turn your IT department from a cost center to a business driver (February 2014)

Secure Web Browsing in Public using Amazon -- Using Amazon.com's cloud services to create a free Web proxy for securely browsing the Internet from public Wi-Fi (July 2011)

Security System Design for Productivity -- Measuring InfoSec productivity using the P>D+R formula, with techniques for improving detection time and accuracy (December 2009)

High Availability Branch Office VPN -- step-by-step directions for implementing WatchGuard's Firebox high availability feature (October 2007)

Performance of an Active Compellent San -- real-world performance test results (June 2007)

Comparison of Novell, Polyserve, and Microsoft’s Clustering Performance -- performance testing against file system clusters on a Compellent San (December 2006)

SmartSite: Integration Framework and Method -- enterprise architecture for creating user-centric, service-centric networks (January 2002)

Linux Open Server for Workgroups -- step-by-step directions on configuring Linux and open source software for your small business (August 2000)

Out and About

I will be presenting at the CSA Nordic Summit and Security Culture Conference events in June, 2015.

Playing With

SimWitty #incog. #incog, or Incognito is a C# library for demonstrating steganographic techniques and covert channels. I am also playing with the PoshSec framework and scripts, specifically for implementing the SANS 20 Critical Security Controls.