Research

Listed below are a sampling research reports written by Pete Lindstrom while at Spire Security and Hurwitz Group (includes sponsor names where applicable). For review copies of any of these reports, please contact Pete at petelind@spiresecurity.com.

YEAR TITLE
2013 NAC, 802.IX AND BYOD, Advantages, Constraints and Capabilities, Forescout Technologies
2011 A Proactive Approach to Server Security, Bit9 Inc.
2011 Generating Value with Continuous Security Testing and Measurement, Core Security Technologies
2011 Network Access Control and 802.IX, Forescout Technologies
2011 The Prevalence of “Next-Gen” Malware, Intel Corporation
2009 Firewall Economics, Spire Research Report, Secure Passage
2009 SOC/NOC Convergence, An IT Service Mgt. Approach to Security/Network Operations, AccelOps, Inc.
2009 The Next Generation of Network Data Leakage Protection , Fidelis
2007 The Pen Test Gut Check, The Economics of Penetration Testing, Core Security Technologies
2006 Death To Passwords, Imprivata
2006 Economic Showdown, Host Intrusion Prevention vs. Patch Management, McAfee
2006 Enterprise Security Management, Check Point, Inc.
2006 Getting the “NAC” of LAN Security, A Spire Research Report, Nevis Networks
2006 Network Packet Archival , Spire Clarifier
2006 Putting Security to the Test, Spirent
2006 The Information Security Imperative, Information: Free, Fortified and Filtered?, PortAuthority
2006 Unused IP Address Space, A nascent Weapon in the War on Security, Mirage Networks
2005 CISO Reporting and CEO Support, Spire Clarifier
2005 Managing Privileged Accounts, CyberArk
2005 Risk and Threat Modeling, Work Smarter, Not Harder, Skybox
2005 Securing the PC, Definitive Endpoint Threat Prevention , Securewave
2005 Truth and Fiction with Single Sign-On , Imprivata
2004 Attacking and Defending Web Services, , Forum Systems
2004 Date-Centric Security, , Guardium
2004 Intrusion Prevention Systems (IPS) , Next Generation Firewalls, Top Layer
2004 Network vs. Host-Based Vulnerability Management, Symantec Corp.
2004 On the Inside Looking Out, Blue Coat
2004 Selecting an Email Security Solution, CipherTrust
2004 Vulnerability Assessment, Business Enablement with a Web Service, Qualys
2003 A Paradigm Shift In Web Application Security , A Spire Research Report, Teros
2003 A Plethora of Packets, Dealing with Security Information Overload, Network Intelligence
2003 Best Practices in Web Conferencing Security , , Latitude
2003 Let’s Get Physical, The Emergence of the Physical Threat, Netbotz
2003 Log Management, Addamark Technologies
2003 Next Generation Secure Computing Base, Truth and Fiction about Microsoft’s “Palladium”
2003 Protecting Against Web Services Threats, A Spire Research Report, Forum Systems
2003 Securing the Trusted Network, Palisade Systems
2003 Security Bounty Hunters, Creation of a new profession?
2003 Security Resource Planning, Archer Technologies
2003 Selecting a WLAN Monitoring Solution, AirDefense
2003 Shavlik Technologies, Proactive Patch Management , Shavlik
2003 The Emergence of the Vulnerability Shield , Lucid Security
2003 The Evolution of Single Sign-on , Imprivata
2003 The Hidden Cost of Virus Protection, Sophos
2003 Understanding Intrusion Prevention, Network Associates
2003 Vulnerability Remediation, The Key to Reduced Risk, Citadel
2003 What’s Your Vector, Victor?, Protection Vectors for Worms and Viruses, Spire ViewPoint
2002 NFR Security’s Intrusion Management Vision, NFR Security, INC.
2002 Protecting the Perimeter — Symantec Gateway Security, HURWITZ REPORT , Symantec Corp.
2002 Provisioning:   A New Approach to Streamlining Business and IT Ops, HURWITZ REPORT , IBM – Tivoli
2002 Return on Investment in Web Security, NetContinuum
2002 The Web Services Security Developer’s Lifeline, Research Report, Phaos
2002 Who is Liable for Security Bugs?  Stuck between Rock & Hard Place, HURWITZ REPORT
2001 A Practical Approach to a Comprehensive Security Program , HURWITZ REPORT, TruSecure Corp.
2001 Identity Management — A Fundamental Discipline in Security, HURWITZ REPORT, Courion Corporation
2001 IT Management As Security, HURWITZ REPORT, Bindview
2001 Maximizing Return on Investment with Tivoli Security Mgt. Solutions, HURWITZ REPORT, Tivoli Systems Inc.
2001 Proactive Enterprise Risk Management, HURWITZ REPORT, Xacta Corp.
2001 Ten Rewards of PKI, HURWITZ REPORT, Access 360
2000 e-Marketplaces: Issues, Risks, and Requirements for Success, HURWITZ REPORT, Tivoli Systems Inc.
2000 PATROL for MG:  Bringing MQSeries Management into Integrated Ent. , HURWITZ REPORT, BMC Software, INC.
2000 Web Application Security:  Protecting e-Business from Attack, HURWITZ REPORT, Sanctum, INC.