4 Root Causes of Cyber Security Failures

Root cause summary as described in my testimony for the Senate Appropriations Subcommittee on Financial Services and General Government on the recent Office of Personnel Management (OPM) data breaches. Four primary root causes have led to the massive data breaches and compromises of core mission IT systems in multiple government agencies and many private sector […]
Read More ›

Your New Device Probably Isn’t Secure

The overwhelming majority of people who purchase computer and networking equipment – whether for home or office – seem to believe that the products will be secure. They probably aren’t. I’ve talked about default passwords before. The basic idea is that manufacturers want to make their products easy for purchasers to configure. To that end, […]
Read More ›

Increase ROI on Each Training Dollar Spent with Learning Tree’s ACCELERATION WORKSHOPS™

Let’s focus on the Activation Training level in our blended learning model, which helps learners on their actual projects and processes with pragmatic support to improve cost, schedule, performance, or customer satisfaction.   WHAT IS AN ACCELERATION WORKSHOP? There is an approach that has proven to be highly effective in driving sustained and positive process […]
Read More ›

Shortening URLs Doesn’t Provide Any Security

Many people misunderstand the role of URL shortening tools. They see them as a security tool, which, they are not. I am on a project team that uses shortened URLs. We do it for user convenience. The shortening tools do one thing – they allow a longer URL to be replaced with a short one. […]
Read More ›

Skeptical Looks at Cryptography

We cannot have cyber security without cryptography! Confidentiality requires encryption of the sensitive data. Integrity is important, hash functions let us detect inappropriate modification of data and system configurations. Authentication of users and hosts can be done in many ways, and the more secure methods involve hash functions, encryption, or some combination of the two. […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.