How Can We Help Users Improve Security?

Maybe we should rename CIA. I don’t mean the government agency by that name. I’m risking heresy by saying that the tired old acronym CIA for Confidentiality, Integrity, and Availability isn’t sacred text. We talk about CIA in Learning Tree’s System and Network Security Introduction course. Let’s take a critical look at it here. I’ve […]
Read More ›

Cyber Security Tradeoffs

Cyber Security in a Nutshell Cyber security simplifies to three pillars: Distinguish between good guys and bad guys. [Authentication] Let the good guys access the data in appropriate ways. [Availability] Don’t let the bad guys access the data at all, and don’t let the good guys do something inappropriate. [Confidentiality and Integrity] Our efforts to […]
Read More ›

My New Year’s Resolution: Use Cloud Backup

It’s the time of year to think about those plans for making the next year better — lose weight, quit smoking, learn some new skill. Here’s what I’m urging people to do: take advantage of very inexpensive and easy-to-use cloud storage services and make backup copies of your precious personal data. Digital photographs and movies, […]
Read More ›

Spring Cleaning in September

Last week I cleaned up my office. I replaced my desk, took out a work table and threw out a lot of junk that had built up over the last couple decades. I’m not sure why I did it last week, but that’s the way it goes. One thing I did was to purge some […]
Read More ›

Practice These Four Acts to Develop Trust and Protect Your Integrity

One of the first questions every project team member asks is, “Do I trust my project leader?” If the answer is “no,” then they start looking for another project leader. When you take the time to understand what motivates and inspires the project team members and what their expectations are for you, then you can […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.