Password Cracking Just Got Easier

Cracking or discovering a simple password is not difficult, but it can be time-consuming. It just got a bit quicker. We discuss and demonstrate multiple ways to do that in Learning Tree Course 468 System and Network Security Introduction. One mechanism we do not demonstrate is the use of graphics cards (GPUs) to do the […]
Read More ›

People May be Too Fearful of Phishing Now

For years security professionals have tried to convince family, friends, and fellow employees to be wary of unsolicited email messages. We’ve shared examples of phishing emails, sent out tests, and stressed the consequences of sharing confidential data. It all may have worked too well! SC Magazine reported last year that employees are ignoring legitimate business […]
Read More ›

Update Your Browser Now

Developers of internet-facing applications are constantly working to find and fix security issues with those applications. Browser writers are no exception; in fact, they may be the most active. Sometimes they find vulnerabilities on their own or by using code analysis tools. There are many lists on the ‘net of such tools and https://phoenixnap.com/blog/vulnerability-assessment-scanning-tools is […]
Read More ›

Is Anonymous Data Really Anonymous?

Cyber security professionals are also often involved in ensuring the privacy of organizational and customer data. One important category of that data is Personally Identifiable Information or PII. That is data where it can be determined to whom the data belongs. One example of PII is stored credit card information. A database may include a […]
Read More ›

Protect Secrets in the Cloud with Homomorphic Encryption

IBM recently announced big developments in homomorphic encryption. This could bring trustworthy confidential computing into the mainstream. What is Confidential Computing? Many organizations say that they can’t use the cloud. They can’t put their data in someone else’s data center. Now, if you only use cloud storage, then all is fine. Encrypt the data on […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.