The New Cybersecurity Maturity Model Certification (CMMC)

The new Cybersecurity Maturity Model Certification (CMMC) regulation has the industry ramping up federal contractor security from the prime contractors down through the supply chain.  The biggest issue with the new regulatory requirement is usually where to begin.  This usually begins with which maturity level (ML) does the organization need.  Once that is determined, the […]
Read More ›

Voice Assistants at Work: Can You Trust Them Not To Eavesdrop?

Amazon Alexa, Google Assistant and other digital voice assistants are rapidly moving from the home to the workplace. Along with the many potential benefits, there are concerns to consider. The idea of asking a voice assistant to set reminders, answer questions, and remember ideas is compelling. I can see using them in meetings and training […]
Read More ›

Authenticating Your Email Domain With DKIM

Spammers and phishers often forge email “from” addresses to make their messages look legit. DKIM (DomainKeys Identified Mail) is a tool designed to help these forgeries. The idea behind DKIM is straightforward: an outgoing mail server digitally signs an email message and the receiving system, or perhaps the mail client itself, verifies the signature. In […]
Read More ›

The New CWE List is Out: There Are A Lot of Familiar Entries

The first step in solving a problem is to recognize that it does exist. Zig Ziglar It is important for us to know what the weaknesses in computer systems in order to know how to secure them. To that end MITRE maintains lists of computer vulnerabilities and weaknesses in software systems. They recently updated the […]
Read More ›

Deepfakes: Beauty and Ugliness

This whole deepfake thing has me concerned and bordering on frightened. And I’m not the only one. I wrote earlier about how neural networks can make realistic-looking faces. They are getting better. A whole collection of the faces is now available for free. These are faces of people who do not exist at all. Samsung […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.