
Authentication, Authorization, Accounting and Identity Management
John Busso | | accounting, Authentication, authorization, Cybersecurity, management, Network Security, passwords, security
The AAA framework is the logic behind Identity Management systems. AAA stands for Authentication, Authorization, and Accounting that this blog will explain. Authentication “Authentication is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity. In contrast with identification, which ... Read More

Steps to Become a CISSP (Certified Information Systems Security Professional)
John Busso | | certification, Certified Information Systems Security Professional, CISSP, credits, Cybersecurity, education, security bloggers network
There are countless IT certifications today. One of the best for IT Security professionals is the Certified Information Systems Security Professional (CISSP), sponsored by the International Information Systems Security Certification Consortium, or (ISC)2. Exam pricing for U.S. candidates is either $549 or $599 depending upon whether you choose to do ... Read More

Basics of Bluetooth Low Energy (BLE)
BLE (originally introduced as Bluetooth Smart) is an extension to the Bluetooth 4 standard. It is important to understand that BLE does not replace Bluetooth, but instead it enhances Bluetooth. Bluetooth was defined under the IEEE 802.15 specification. 802.15 defines personal area networks for users and their devices. We commonly ... Read More

BYOD and Securing It to Protect Your Organization
John Busso | | Cybersecurity, iot, Mobile, Mobility, Network Security, security bloggers network, wifi
BYOD, which stands for bring-your-own-device, is an important concept. With its supporting technologies it is accelerating telecommuting and collaboration in the workplace at a rapid pace. When selecting a BYOD strategy it is important to focus on some key areas. Understand your users’ needs. Establish clear policies. Define the discovery ... Read More

Make like a Network Design and LEAF
John Busso | | access layer, Cybersecurity, design, leaf-spine, network, Network Security, security bloggers network
The post Make like a Network Design and LEAF appeared first on CCSI ... Read More