Encrypt Early, Encrypt Often

My last post was about malicious update notices that pop up when using public network connections. I advised checking digital signatures on the updates. I want to add to that and expand a bit on public communication channels and storage. First, when you use a public network, wired or wireless, your data may not be […]
Read More ›

Update Before You Leave! And Other Advice for the Cyber Road Warrior

I recently traveled to Denver to attend the American Society for Training and Development’s (ASTD) International Conference and Exposition (ICE). I stayed at the Embassy Suites next to the conference venue, the Colorado Convention Center. (The conference was fantastic, by the way, but that’s not what this post is about…) While I was there the […]
Read More ›

What Is Computer Security?

What is “computer security”? When Adrian Bryan and I set out to write our Introduction to System and Network Security course for Learning Tree some years ago, we needed to start with a definition. It served as a sort of goal or guiding light in writing the course materials. The definition is from Simson Garfinkel […]
Read More ›

Turn Left Two Times to 33

Turn left two times to 33… What the heck? Okay, so it’s an odd headline, but it has a very real meaning–to me at least, and I want it have one to you, too. When I was a young boy my father got me a safe so I could keep things away from my little […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.