What you Need to Know About WebRTC and IP Address Leaks

I’ve been working on a contract recently that requires end-to-end communication between two PCs. Each PC could be behind a firewall or NAT router and the client does not want to require users to have to install software on their PCs. While looking at solutions I came across the WebRTC API. WebRTC (the RTC is […]
Read More ›

Linux Scores Highest in UK Government Security Assessment

As we discuss in Learning Tree’s Cloud Security Essentials course, the cloud is based on open-source technology including Linux, and cloud customers use Linux more than any other operating system. Now a major report makes that look like a good trend for security reasons. The Communications — Electronics Security Group or CESG is a group […]
Read More ›

New course on Protecting Your Perimeter

I spoke earlier this week to the author of Learning Tree’s new course (2010) Defending The Perimeter From Cyberattacks: Hands-On, Adrian Brian. Adrian and I have been friends for many years and when he told me he had just written this new course, I wanted to share it with you right away. This course addresses […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.