Keep Your Certificates Up To Date

Someone from a major aerospace manufacturer asked me for some cybersecurity assistance a few months ago. A security audit had resulted in a worrying but mystifying warning about SSL certificates. Their secure web site would cease functioning in just a few days. We fixed that, but similar deadlines are approaching over the next two years […]
Read More ›

New Year’s Resolution: How to Back Up Your Data

Last week I encouraged you to use Amazon’s cheap and extremely resilient Glacier service to archive your personal data. Let’s see how to do this. Glacier uses the same storage technology as S3, for just one-tenth the cost. The primary trade-off is that Glacier is intended for archiving data, not using it, and to get […]
Read More ›

Why an Upgrade to SHA-2 Needs to be Part of Your Cyber Security Strategy

Back in 2013 I introduced the concept of hashing to readers of this blog. We also discuss it in Learning Tree’s System and Network Security Introduction. One aspect of hashing I didn’t discuss much was hash algorithms. There have been many hash algorithms in popular use over the years including MD4 and Snefru, for many […]
Read More ›

Why a Bitcoin Bank?

I have to confess that I just don’t get Bitcoin and the other cryptocurrencies. I don’t mean the cryptographic part of it, I do understand how it works. And Silk Road and its replacements demonstrate the utility. But I don’t get why so many people use it the way they do. Cryptocurrency today seems to […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.