authentication authorization accounting

Authentication, Authorization, Accounting and Identity Management

The AAA framework is the logic behind Identity Management systems. AAA stands for Authentication, Authorization, and Accounting that this blog will explain. Authentication “Authentication is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity. In contrast with identification, which ... Read More
cissp

Steps to Become a CISSP (Certified Information Systems Security Professional)

There are countless IT certifications today. One of the best for IT Security professionals is the Certified Information Systems Security Professional (CISSP), sponsored by the International Information Systems Security Certification Consortium, or (ISC)2. Exam pricing for U.S. candidates is either $549 or $599 depending upon whether you choose to do ... Read More
John Busso

Basics of Bluetooth Low Energy (BLE)

BLE (originally introduced as Bluetooth Smart) is an extension to the Bluetooth 4 standard. It is important to understand that BLE does not replace Bluetooth, but instead it enhances Bluetooth. Bluetooth was defined under the IEEE 802.15 specification. 802.15 defines personal area networks for users and their devices. We commonly ... Read More
John Busso

BYOD and Securing It to Protect Your Organization

BYOD, which stands for bring-your-own-device, is an important concept. With its supporting technologies it is accelerating telecommuting and collaboration in the workplace at a rapid pace. When selecting a BYOD strategy it is important to focus on some key areas. Understand your users’ needs. Establish clear policies. Define the discovery ... Read More
leaf-spine

Make like a Network Design and LEAF

The post Make like a Network Design and LEAF appeared first on CCSI ... Read More
John Busso

How the Grinch (and his band of hackers) stole Christmas

In 2017 Hackers abound and we are all aware of it. However be aware that during the holiday season hackers are extra giving…of phishing attempts, malware, and Trojans, which all help them steal from you or your favorite retailer due to our laziness and lack of knowledge. Below are a ... Read More
John Busso

Recent Wireless Vulnerabilities Made Public and Vendors Respond Quickly

Wireless is no longer something that we might use while staying in our hotel or sitting in the local coffee shop. Today mobile devices require ubiquitous wireless connectivity. That convenience can make our online experience better and faster. The prevalence of wireless access points everywhere we go has increased revenue ... Read More
wifi

Wireless Penetration Testing: What You Should Understand

Wireless is here to stay and becoming more and more pervasive. Understanding wireless and the risks and vulnerabilities involved with its use are crucial concerns for your organization’s security staff. We have all heard the horror stories associated with a company’s Wi-Fi used to breach their security. The most famous ... Read More
SDWAN

Why the Hype about SDWAN

The post Why the Hype about SDWAN appeared first on CCSI ... Read More