Cloud in the Crosshairs: Choose Carefully and Secure Your Cloud Servers
Feb 10, 2014
Learning Tree recently received an alarming message from Amazon reporting that an IaaS instance started for a course event “has been placing spam (unsolicited messages, typically advertisements) on websites hosting online discussions, such as Internet forums: check the information provided below by the abuse reporter.” What happened? In Learning Tree’s Cloud Security Essentials course we […]
What is a Vulnerability?
May 30, 2012
In discussions and meetings with other information security professionals, I hear a lot of misinformation. I’m a geek and like to be more precise, rather than less. The use of the term vulnerability is a special pet-peeve of mine. The core of information assurance is making sure you don’t have serious vulnerabilities. So, what exactly […]