Protect Secrets in the Cloud with Homomorphic Encryption
jan 19,
2021
IBM recently announced big developments in homomorphic encryption. This could bring trustworthy confidential computing into the mainstream. What is Confidential Computing? Many organizations say that they can’t use the cloud. They can’t put their data in someone else’s data center. Now, if you only use cloud storage, then all is fine. Encrypt the data on […]
DevSecOps Requires Integrating Cyber Security From the Start
dec 4,
2020
Cyber security must be an integral part of software development and deployment. I’ve said that for years of teaching Learning Tree’s Introduction to Cyber Security, and now there is a design philosophy to help make that happen. DevSecOps is an enhancement to the popular DevOps philosophy and methodology to integrate proper security practices into the […]
Deepfakes: Beauty and Ugliness
nov 20,
2020
This whole deepfake thing has me concerned and bordering on frightened. And I’m not the only one. I wrote earlier about how neural networks can make realistic-looking faces. They are getting better. A whole collection of the faces is now available for free. These are faces of people who do not exist at all. Samsung […]
Introduction to the NICE Framework
okt 15,
2020
This is the first of six articles in our series from Learning Tree instructor Aaron Kraus on the NICE Cybersecurity framework and common challenges many organizations face when trying to maintain vital cybersecurity skills and resources. To further your journey, read the rest of the blog series and learn more about Aaron Kraus here. The […]
NICE Framework: ”Securely Provision” Challenges
okt 14,
2020
This is the second of six articles in our series from Learning Tree instructor Aaron Kraus on the NICE Cybersecurity framework and common challenges many organizations face when trying to maintain vital cybersecurity skills and resources. To further your journey, read the rest of the blog series and learn more about Aaron Kraus here. Typical […]