2 US patents in data travel security. 40 years of packet-level expertise. Pentagon 9/11 communications recovery. 6 military deployments. 50,000+ professionals trained across 27 countries. 75+ Fortune 100 engagements.
When vendors point fingers and departments shift blame, I find the truth. Four decades of deep packet expertise applied to your most critical failures.
Analyze where your data actually travels, how many hops, to what countries. Recommend hop limits to contain sensitive data and prevent exfiltration before it happens. Based on 2 granted US patents (2020, 2022).
Request an AssessmentStrategic advisory on proactive security posture. SolarWinds-style breach analysis, attack surface reduction, and defense strategies built on real-world incident research.
Get in TouchDeep packet analysis for incident investigation. Protocol-level diagnostics across TCP, QUIC, and BGP. Wireshark-based network security audits from the expert who trained thousands in the methodology.
Get in TouchSpecific capabilities. Specific outcomes. The credentials speak for themselves.
2 US Patents in Hop Starvation / Data Travel Security (granted 2020, 2022)
Pentagon 9/11 — Led communications recovery team following the attack
6 Military Deployments — Iraq & Afghanistan with USCENTCOM, deep packet analysis across the war network
50,000+ Trained — Network forensic professionals across 27 countries
3,500+ Certified NetAnalysts — Pine Mountain Group, NetQoS, CA Technologies
75+ Fortune 100 engagements — stock exchanges, global enterprises, government
Vint Cerf — the father of the internet called the hop starvation approach "clever"
EMA "Vendor to Watch" — Industry analyst recognition. ISSA Austin board. SharkFest keynote speaker.
Real engagements where truth was disputed. Measurable outcomes. Problems the big five couldn't touch.
Severe application slowness affecting user productivity. Deep packet analysis identified a VLAN parameter misconfiguration that every other team missed.
SSL-related application performance degradation across the enterprise. Packet trace analysis pinpointed the root cause using the "Three T's" — Tools, Theory, and Time.
Data breach investigation. Data travel analysis tracked data movement from the attack and proved valuable data was NOT lost.
I can think of no one more qualified in network troubleshooting and training when it comes to Bill. Especially in the fields of network and security analysis. I have witnessed him solve issues that the big 5 couldn't even touch.
He's by far one of the best technically skilled people I know. He has a vast library of knowledge and experience. He is also a profound teacher — great at sharing his experience to teach and serve others. He's not a passenger in this networking life but a true navigator. He's reliable to get to solutions and develop ideas that manifest into truly getting solutions to happen.
Weekly analysis of the forces reshaping cybersecurity. Moderated by Bill Alderson, with Jim Rounsville and Gus Stein. Real expertise, no hype. Complemented by the TechFuturesIndex.com live data dashboard.
Disaster Recovery Responder Stories & Lessons Learned
Pentagon 9/11 Recovery: Lessons in Crisis Response & Readiness
US Military Biometric Systems: Digital War Lessons from Iraq
Cyber Crises & Lessons Learned — DDOS US Stock Markets
Radia Perlman: Spanning Tree, Networking Lessons & SharkFest Keynote
When ATMs Fail: Banking Outages, Black Swans & Digital Risk
Weekly AI + Cyber convergence intelligence from the same system that powers our podcast. Direct to your inbox. No fluff.