How to Configure Linux for U2F Authentication

In my last post, I wrote about the benefits of U2F – Universal Two-Factor Authentication. Here are the three phases of installing it as the second factor on a Linux VM. For this article, I assume you have a Linux VM (or computer) configured with access to a USB port. I did this more as […]
Read More ›

Helping Users Understand Cybersecurity: Availability Becomes Reliability

Last week I explained how I thought that “Accuracy” was a better term than “Integrity” when we are communicating with users. The week before that, I said that “Privacy” is a better term than “Confidential”. This is part of my wild idea for replacing “CIA” with “PAR”. Privacy, Accuracy, and Reliability. What Does “Available” Mean […]
Read More ›

Helping Users Understand Cybersecurity: Integrity Becomes Accuracy

In a previous blog post I explained how I thought that “Privacy” was a better term than “Confidentiality” when we are communicating with non-specialists. Everyday users must play their role in protecting information. This is part of my heretical suggestion that we would should replace “CIA” with “PAR”, as in Privacy, Accuracy, and Reliability. What […]
Read More ›

Understanding Cyber Security: Confidentiality Becomes Privacy

In early August I made the heretical suggestion of replacing “CIA” with “PAR”, as in Privacy, Accuracy, and Reliability. Grim talk about “The CIA Triad” suggests to many users that it is nothing for them. But we can’t have information security without user understanding and involvement! We talk about CIA in Learning Tree’s System and […]
Read More ›

Tools for Reducing Software Vulnerabilities

NIST, the US National Institute of Standards and Technology, released a report last December, “Dramatically Reducing Software Vulnerabilities.” It has multiple useful and interesting ideas for improving vulnerabilities in software. I want to highlight two that I felt were most important. 1. Education There is no technological substitute for developer discipline. Education is not just […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.