Certification and Compliance Don’t Make You Secure

Security > Certification + Compliance Certification and compliance can play a role in security.  They might be part of security, but there is no guarantee that they can provide it. Put another way, they might be necessary, at least for regulatory reasons, but they are not adequate on their own. Passing a certification exam proves […]
Read More ›

Password Pet Peeves

Why am I spending so much time talking about passwords? To begin with it’s because we can’t get rid of them, and that’s my first pet peeve. I know that static passwords (those that must be explicitly set) are easy to implement and use. That makes them convenient. For passwords on the web, I can […]
Read More ›

Improving Android Security with Encryption

When developing Android applications for any professional organisation, the question of security always comes up, as indeed it should. There are many issues that should be considered regarding mobile application security so let’s take a look at one common one: data encryption. The first thing to do it to analyse your data and see it […]
Read More ›

Drought and Floods

There is a drought here in New Mexico, according to the weather folks on TV. We’ve had some rain, but our precipitation is below normal this year. You may have read about the forest fires in New Mexico and that is a direct result of the drought. Yahoo! had a password “leak” last week  (as […]
Read More ›

The Undetectable Threat of Cloud Sprawl

In my previous post, I shared about how someone’s greatest fear about cloud computing was how easy it can be. It is so easy, and so tempting, for someone inside your organization to quickly and quietly push some of your data out into the cloud. There is no trail left to tell that this happened, […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.