The following is a summary of published articles, bylines, interviews, white papers, books and other online media appearances of Mitchell Ashley.
Online Community, Blogging and Podcasting
- Blog: Network World Microsoft Subnet (sponsored blogger)
- Blog: The Converging Network
- Podcast: Converging On Microsoft Podcast - new
- Podcast: Still Secure After All These Years
- Online Community Site: StillSecure Cobia Community
- Corporate Blog: Cobia Blog
Industry Recognition
- Secrets of the Windows Gurus, Redmond Magazine
- The Top 59 Influencers In IT Security, IT Security
- Career Profile, Tech Careers
Video Interview
- A better NAC than Cisco?, Network World Hot Seat with John Gallant
Q&A Interview Articles
- Licensing in an Evolved Open Source Ecosystem, IT Business Edge
- NAC Q&A, InternetNews.com
- Vulnerability Management: Q&A, IT Observer
- StillSecure Takes the Next Step with Virtual IPS, IT Business Edge
- Surveillance Exposes Malware That Comes Back From The Dead, Search Security
- The Entire Enterprise on ITs Shoulders, Search Security
- PCI Gets Proactive About Data Security, IT Business Edge
- StillSecure Releases Strata Guard Free, InfoWorld
- StillSecure CTO Outlines Biggest Network Security Vulnerabilities, TechNewsWorld
- Security Organizations Studied, IT Business Edge
- Securing The Desktop, E-Commerce Times
Media Appearances and Quotes
- Data Center Series Best Products 2008, Network World
- StillSecure Unveils Cobia Partner Program, Support/Purchase Programs, IT News Online
- StillSecure Bets on Embedded Security, Dark Reading
- Open Source Security Platform Debuts, Network World
- Security Is Not An Add-On, IT Security
- Vista Shows Better Security Than..., Computerworld
- Windows Vista: A Baby Step for Microsoft NAP, IT-Observer.com
- NAC Q&A, InternetNews.com
- The Future of Enterprise Security, CIO Today
- Defense In Depth, Processor Magazine
- Integrated Security Now, Government Security News
- Malicious Code 'Could Hide In Windows Registry', ZDNet UK
- E-commerce in crisis: When SSL isn't safe, Computerworld
- PCI Gets Proactive About Data Security, IT Business Edge
- Combating ID Theft on the Internet, E-Commerce Times
- Detecting & Controlling Skype, Processor Magazine
- The Future of Enterprise Security, Top Tech News
- Fine-tune your IDS/IPS, Com News
- Enterprise Security Grows But Interoperability Questions Remain, Enterprise Systems Journal
- Tech industry presents less-than-unified defense, USAToday
Authored Books
- Growth Strategies For Software Companies: Industry Leaders On
Management Team Leadership Strategies, Financial And Profitability
Measures, And Setting Goals For Long Term Success- Chapter: Strategies for a Successful CTO
Authored Byline Articles
- No Immunity for Macs, Mac News World
- Summer IT Clean-Up and Security Improvement, College Planning & Management
- Rethinking Endpoint Security, ISSA Journal
- Fine-tune your IDS/IPS, Com News
- Endpoint Compliance, Access or Lock Down?, Information Storage & Security Journal
- Patching Placebo, Technical Support Magazine
- The Patching Game, IT Defense Magazine
- Network Security: Protecting Patients and Patient Data, HealthLeaders Media
- There Might Be an Agent in Your Agent-Less Solution, IT Defense Magazine
- Endpoint Security Rollout, Secure Convergence Journal
- The Danger Within, American School and University
- Assessing Endpoint Security Options, IT Security Source
- A Network Is Threatened By Its Own Endpoints, ISACA
- VISA PCI Best Practices for All Organizations, SOX Compliance Journal
- A Guide To Wireless Security, ISACA
Authored White Papers
General Security
- Network Convergence: The Unified Network Platform
- Layered network security 2006: A best-practices approach
- The Move to Integrated Network Security
Network Access Control
- When is ‘Agent-less’ Not Agent-Less
- Friendly fire: Protecting the network from its own endpoints
- Securing the university network: An introduction to endpoint security options
Regulatory Compliance
- PCI Compliance: A technology overview
- Data Protection Rule of the GLBA: A strategy for compliance
- Staying compliant with the evolving security regulations of GLBA
- A How-To Guide for HIPAA Security Requirements
- Passing an information security audit: Targeted reporting for network vulnerability management
Speaking, Podcast and Webcast Appearances
- Category-Breaker: Ashley on Cisco's VFrame Data Center, Network World Best Products 2008 Podcast
- Friendly Fire: Protecting Networks From Their Own Endpoints (mp3), Tech Forum Live
- Companies That Think They Are Secure Are Into Denial (mp3), W3W3.com
- Unified Networking Platform, Network Security Podcast with Martin McKeay
- Critical Infrastructure Protection, Secure IT Live
- The Rule Makers and Breakers: Regulatory and Policy Compliance and Enforcement, Homeland Security for Networked Industries
- Best Practices and Technologies for Data Management, Silicon Flatirons
- Compliance Polices for Endpoint Devices, InfoTechLive
- The Dark Side of Telecommuting, Information Technology Security and Privacy Conference, State of Maryland
- SANS Tool Talk Webcast, SANS Institute
- Remote Access: The Dirty Security of Network Security, US Department of Energy Cyber Security Group Training Conference
- Security and Technology Online, SATO Events Online
Social Networks