Showing 248 results for the search term "John McDermott".
There are two common ways the bad guys might try to break into a building: spend lots of effort on one door or window, or try each door and window to see if one is easier to enter than the others. The same is true for attackers trying to compromise systems and networks (and penetration […]
According to news reports from outlets including IDG’s CSO, the US Department of Homeland Security said in early April of this year that there are unauthorized “stingrays” in the Washington, DC areas and in “other cities.” To be perfectly honest, I cannot find the term stingray in the documents I read, and “StingRay” is a […]
Business Email Compromise or BEC is not a new cybersecurity attack vector, but it is gaining more attention as it is becoming more common. The basic idea is that a scammer or con-artist uses deception to pretend to be a high-level official of an organization in order to compromise that organization or to otherwise profit. […]
Security of wireless networks has always been essential. This January the Wi-Fi Alliance® announced a new version of its Wi-Fi Protected Access® or WPA designed to improve the security of 802.11 wireless networks. The four improvements directly address authentication and confidentiality of the networks. Since most of us have Wi-Fi networks in our homes, offices, […]
Certification and credentialization are requisite parts of today’s business landscape. The field of Information Technology is no exception. Learning Tree offers a broad range of IT certifications for employees with varying skill levels. I received my first IT certification in 1985 from The Institute for the Certification of Computing Professionals, now known as the ICCP. […]