Injections (Not the Kind from the Doctor!)

Dark Reading reported in early May of this year that injection attacks are on the rise again. Injection attacks were also number one on the OWASP (Open Web Application Security Project) Top Ten for 2011. The OWASP Top Ten project describes itself  as “a broad consensus about what the most critical web application security flaws […]
Read More ›

Encrypt Early, Encrypt Often

My last post was about malicious update notices that pop up when using public network connections. I advised checking digital signatures on the updates. I want to add to that and expand a bit on public communication channels and storage. First, when you use a public network, wired or wireless, your data may not be […]
Read More ›

Update Before You Leave! And Other Advice for the Cyber Road Warrior

I recently traveled to Denver to attend the American Society for Training and Development’s (ASTD) International Conference and Exposition (ICE). I stayed at the Embassy Suites next to the conference venue, the Colorado Convention Center. (The conference was fantastic, by the way, but that’s not what this post is about…) While I was there the […]
Read More ›

What Is Computer Security?

What is “computer security”? When Adrian Bryan and I set out to write our Introduction to System and Network Security course for Learning Tree some years ago, we needed to start with a definition. It served as a sort of goal or guiding light in writing the course materials. The definition is from Simson Garfinkel […]
Read More ›

Turn Left Two Times to 33

Turn left two times to 33… What the heck? Okay, so it’s an odd headline, but it has a very real meaning–to me at least, and I want it have one to you, too. When I was a young boy my father got me a safe so I could keep things away from my little […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.