Will My Cloud Provider Read My Data?

In my last blog post, I explained how you can verify that Amazon cloud storage is zeroized before being redeployed for the next user. But what about the cloud provider browsing through your data? After all, it’s stored on their hardware in their facility, so they have physical access plus the ability to interact with […]
Read More ›

Social Engineering on Father’s Day

Social engineering is a powerful tool. But, it is tough art to practice.  It’s fun and interesting to read about it.  But, what if you wanted to experience first-hand how it works?  You can’t just waltz into some establishment and run a con game.  Sending phishing or spearphishing emails to friends will not endear you […]
Read More ›

Security Topics on Lifehacker

I like to read. I also like to read about how to get things done better. I therefore read the blog lifehacker.com. Their About page describes the blog as “Tips, tricks, and downloads for getting things done.” The topics range from food, to offices, to computer topics including security. The latter is why I’m talking […]
Read More ›

Exploring Exploits

In security testing, studying and deploying exploits seems to be the most fun. Exploits provoke the most thought and reaction amongst learners, as well. So, what exactly is an exploit?  Let’s take a peek under the hood. Anatomy of Exploits They run the gamut in terms of how they work and what they do. The […]
Read More ›

Who Can Read My Data in the Cloud?

For the sake of your compliance, you hope that the answer is “nobody”! For most organizations, confidentiality is the greatest concern. The most worrying thing about using cloud technology is storing your data on someone else’s hardware. But how big of a risk is this, really? Stored data should be encrypted. However, how much of […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.