Authentication, Authorization, Accounting and Identity Management

The AAA framework is the logic behind Identity Management systems. AAA stands for Authentication, Authorization, and Accounting that this blog will explain. Authentication “Authentication is the act of confirming the truth of an attribute of a si… Continue reading Authentication, Authorization, Accounting and Identity Management

Steps to Become a CISSP (Certified Information Systems Security Professional)

There are countless IT certifications today. One of the best for IT Security professionals is the Certified Information Systems Security Professional (CISSP), sponsored by the International Information Systems Security Certification Cons… Continue reading Steps to Become a CISSP (Certified Information Systems Security Professional)

BYOD and Securing It to Protect Your Organization

BYOD, which stands for bring-your-own-device, is an important concept. With its supporting technologies it is accelerating telecommuting and collaboration in the workplace at a rapid pace. When selecting a BYOD strategy it is important to focus on some… Continue reading BYOD and Securing It to Protect Your Organization

How the Grinch (and his band of hackers) stole Christmas

In 2017 Hackers abound and we are all aware of it. However be aware that during the holiday season hackers are extra giving…of phishing attempts, malware, and Trojans, which all help them steal from you or your favorite retailer due to our lazine… Continue reading How the Grinch (and his band of hackers) stole Christmas

Recent Wireless Vulnerabilities Made Public and Vendors Respond Quickly

Wireless is no longer something that we might use while staying in our hotel or sitting in the local coffee shop. Today mobile devices require ubiquitous wireless connectivity. That convenience can make our online experience better and faster. The prevalence of wireless access points everywhere we go has increased revenue for retailers and allowed us…

The post Recent Wireless Vulnerabilities Made Public and Vendors Respond Quickly appeared first on CCSI.

The post Recent Wireless Vulnerabilities Made Public and Vendors Respond Quickly appeared first on Security Boulevard.

Continue reading Recent Wireless Vulnerabilities Made Public and Vendors Respond Quickly