It’s Phishing Season Again (Still)
Oct 6,
2014
As summer has come to an end, so has the fishing season. If you like to fish, I hope you had a good year! It’s phishing season here too. I wrote last year that It’s always phishing season, but a new crop of issues has come up and they’re good to learn about. My Facebook friends have […]
Examining the Financial Trade-Off to Securing your Organization
Sep 21,
2014
What is perfect security? Does it mean that there can be no break-ins, no stolen credentials, no lost data? Is that a good goal? One of the first things we discuss in Learning Tree Course 468, System and Network Security Introduction is the goals for organizational security. A colleague once said his company’s goal was […]
Training End Users to Defend Against Cyber Attacks
,
2014
The title is from the refrain of a song that was popular many years ago, “Where have all the flowers gone” that was sung by Peter, Paul and Mary. I loved the folk music genre then and I still do today. The question, though, applies to cyber security and it was asked (in a wholly […]
The Connection Between Software Design and Software Security
Sep 20,
2014
Wired reported in early June of this year that there has been a bug in the popular OpenSSL for over a decade that could allow bad guys to eavesdrop on connections, including VPN connections. According to the article, the bug is mostly found in Android phones and VPN software. I hope my Android phone is […]
Three New Trends in Authentication
,
2014
Frequent readers of this blog will know that I tend to follow trends in authentication and that I am interested in making good-quality authentication commonplace. Recently three topics in authentication caught my attention, and I’d like to share them with you. Fujitsu’s PalmEntryXS First, Fujitsu announced PalmEntryXS a new addition to its PalmSecure line. The […]