Encrypt Early, Encrypt Often
My last post was about malicious update notices that pop up when using public network connections. I advised checking digital signatures on the updates. I want to add to that and expand a bit on public communication channels and storage. First, when you use a public network, wired or wireless, your data may not be […]
Update Before You Leave! And Other Advice for the Cyber Road Warrior
I recently traveled to Denver to attend the American Society for Training and Development’s (ASTD) International Conference and Exposition (ICE). I stayed at the Embassy Suites next to the conference venue, the Colorado Convention Center. (The conference was fantastic, by the way, but that’s not what this post is about…) While I was there the […]
What Is Computer Security?
What is “computer security”? When Adrian Bryan and I set out to write our Introduction to System and Network Security course for Learning Tree some years ago, we needed to start with a definition. It served as a sort of goal or guiding light in writing the course materials. The definition is from Simson Garfinkel […]
Turn Left Two Times to 33
Turn left two times to 33… What the heck? Okay, so it’s an odd headline, but it has a very real meaning–to me at least, and I want it have one to you, too. When I was a young boy my father got me a safe so I could keep things away from my little […]