Your New Device Probably Isn’t Secure
May 31,
2016
The overwhelming majority of people who purchase computer and networking equipment – whether for home or office – seem to believe that the products will be secure. They probably aren’t. I’ve talked about default passwords before. The basic idea is that manufacturers want to make their products easy for purchasers to configure. To that end, […]
Increase ROI on Each Training Dollar Spent with Learning Tree’s ACCELERATION WORKSHOPS™
May 24,
2016
Let’s focus on the Activation Training level in our blended learning model, which helps learners on their actual projects and processes with pragmatic support to improve cost, schedule, performance, or customer satisfaction. WHAT IS AN ACCELERATION WORKSHOP? There is an approach that has proven to be highly effective in driving sustained and positive process […]
Shortening URLs Doesn’t Provide Any Security
May 23,
2016
Many people misunderstand the role of URL shortening tools. They see them as a security tool, which, they are not. I am on a project team that uses shortened URLs. We do it for user convenience. The shortening tools do one thing – they allow a longer URL to be replaced with a short one. […]
Skeptical Looks at Cryptography
Mar 22,
2016
We cannot have cyber security without cryptography! Confidentiality requires encryption of the sensitive data. Integrity is important, hash functions let us detect inappropriate modification of data and system configurations. Authentication of users and hosts can be done in many ways, and the more secure methods involve hash functions, encryption, or some combination of the two. […]
What Are Traffic Analysis and Metadata?
Feb 3,
2016
In Learning Tree’s System and Network Security Introduction we discuss “traffic analysis,” noting that even if data are encrypted, one can still find out information by looking at who is sending encrypted data to whom. Along that same line, there has been a lot of discussion in the press recently about “metadata” – information about […]