-
Michael Gregg has more than 15 years experience in the IT field. Michael is the President of Superior Solutions, Inc., a Houston based training and consulting firm. He is an expert on networking, security, and Internet technologies. He holds two associates degrees, a bachelor's degree, and a master's degree. He presently maintains the following certifications: MCSE, MCT, CTT, A+, N+, CNA, CCNA, CIW Security Analyst, and TICSA.
He is a member of the Independent Computer Consulting Association and of the Texas Association of Educational Technology. When he's not training, consulting, or writing, Mike enjoys traveling. He is an avid music collector. His collection ranges from records, 8-track tapes, CD's, and MP3's.
-
Do you have a question for our experts?
-
- Website:
- http://www.thesolutionfirm.com/
- Blog:
- http://www.thesolutionfirm.com/blog/
- Follow:
Contributions from Michael Gregg
- Do social networking products (blogs) pose network security threats?
- After a server outage what emergency steps secure your network?
- What protocol works on all layers of OSI?
- Are there network monitoring tools for Layers 1 through 7?
- Are open source tools safe to use?
- How to block some users from the Internet while allowing others
- How do routers and switches differ in the OSI model?
- How can I define the layered approach to protocols?
- How can I secure our data from hackers?
- What core network security items are needed to secure networks?
- OSI: Securing the Stack, Layer 8 -- Social engineering,
- What intrusion prevention systems (IPS) alogrithms are used and what has been the success of these s
- OSI: Securing the Stack, Layer 7 -- Applications
- Is there an enterprise tool to measure/audit the bandwidth delivered to our company by our vendor?
- Can you help me find good monitoring tools and protocol analyzers?
- OSI: Securing the Stack, Layer 6 -- Encryption
- OSI: Securing the Stack, Layer 4 -- Fingerprinting
- What are some resources to help me better understand network security concepts?
- Route aggregation vs. route summarization
- OSI: Securing the Stack, Layer 3 -- The role of ICMP
Network Management Strategies for the CIO