Meltdown and Spectre: How to Handle These New Vulnerabilities

On January 3, 2018, a group of researchers announced a series of vulnerabilities affecting nearly all microprocessors since 1995. Over the last several weeks, you’ve probably seen many dramatic articles proclaiming doom and gloom regarding Meltdown and Spectre. Even the names strike fear to your core as you conjure images of a digital apocalypse.

Read more

Meltdown and Spectre: How to Handle These New Vulnerabilities

On January 3, 2018, a group of researchers announced a series of vulnerabilities affecting nearly all microprocessors since 1995. Over the last several weeks, you’ve probably seen many dramatic articles proclaiming doom and gloom regarding Meltdown and Spectre. Even the names strike fear to your core as you conjure images of a digital apocalypse.

Read more

Top 5 IT Blog Posts of 2017

Global Knowledge’s top blogs of 2017 all have one thing in common: Tips for success. Whether you’re mapping out an IT certification track, troubleshooting a VPN or searching for the perfect tech toy to add to your wish list, our most-viewed blogs of the year are filled to the brim with lessons, guidelines and advice for IT and non-IT professionals. Learn more about ITIL®, Cisco certifications, the importance of washing your hands (this will make more sense shortly) and more in our five most popular blog posts of the year.

Read more

Tech the Halls: 12 Tech Toys to Add to Your Holiday Wish List

You’re never too old for tech toys! We asked Global Knowledge’s resident techies for their most coveted tech gifts of 2017. From home security, to video game consoles, to devices that can help you find your car keys (don’t laugh, you know you’ve been there), there’s something for everyone on this year’s Tech the Halls gadget list.

Read more

DoS, DDos and DeOS… Oh My!!

In the security industry, we classify our security infrastructure in a variety of ways. One important classification method is called the “CIA Triad,” which refers to three security objectives defined by the Federal Information Security Management Act (FISMA). These three objectives are Confidentiality, Integrity and Availability. The goal of any information security team is to protect against these three objectives, and the goal of an attacker is to compromise one or more of these objectives.

Read more