How to Build Resilience in Critical Infrastructure
Oct 31, 2016
Back to Chemistry Class No matter what area of engineering you study, chemistry will be involved. The whole world is made out of chemicals, after all. One of the more interesting sections of my chemistry classes was part of a semester on metallurgy. Some was what you would think of as classical chemistry: the proportions […]
Are You Absolutely Certain That You Have The Real Source Code?
Jul 18, 2016
Why would you want to build a Linux kernel? Maybe you realize that there’s a local root exploit possible on your kernel version. Maybe you want to take advantage of improved storage performance or extended network capability. Maybe you need a very specific kernel version to support a combination of your motherboard hardware plus network […]
The Internet Has Serious Trust Problems, Part 2: Data Loss Prevention Leads to Trust Loss
Apr 21, 2014
Last week I explained the cryptographic side of digital certificates and secure web site identity as we discuss it in Learning Tree’s System and Network Security Introduction course. But that only explained the part that works well. This week, I’ll tell you where it has been falling apart. A root CA can create something called […]
What’s The Story of the OpenSSL Hack?
Jan 27, 2014
As we discuss in Learning Tree’s Cloud Security Essentials course, the cloud is based on open-source technology. And, if you are developing your own solutions, as you do in PaaS (Platform as a Service) and IaaS (Infrastructure as a Service) cloud settings, you should use carefully tested and trusted open-source components. The OpenSSL project provides […]