How to Build Resilience in Critical Infrastructure

Back to Chemistry Class No matter what area of engineering you study, chemistry will be involved. The whole world is made out of chemicals, after all. One of the more interesting sections of my chemistry classes was part of a semester on metallurgy. Some was what you would think of as classical chemistry: the proportions […]
Read More ›

Are You Absolutely Certain That You Have The Real Source Code?

Why would you want to build a Linux kernel? Maybe you realize that there’s a local root exploit possible on your kernel version. Maybe you want to take advantage of improved storage performance or extended network capability. Maybe you need a very specific kernel version to support a combination of your motherboard hardware plus network […]
Read More ›

The Internet Has Serious Trust Problems, Part 2: Data Loss Prevention Leads to Trust Loss

Last week I explained the cryptographic side of digital certificates and secure web site identity as we discuss it in Learning Tree’s System and Network Security Introduction course. But that only explained the part that works well. This week, I’ll tell you where it has been falling apart. A root CA can create something called […]
Read More ›

What’s The Story of the OpenSSL Hack?

As we discuss in Learning Tree’s Cloud Security Essentials course, the cloud is based on open-source technology. And, if you are developing your own solutions, as you do in PaaS (Platform as a Service) and IaaS (Infrastructure as a Service) cloud settings, you should use carefully tested and trusted open-source components. The OpenSSL project provides […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.