Data Safety and Information Security

Data Safety and Information Security

676 bookmarks
Custom sorting
SpiceDB | AuthZed
SpiceDB | AuthZed
SpiceDB is an open source, Google Zanzibar-inspired database for creating and managing security-critical application permissions.
·authzed.com·
SpiceDB | AuthZed
JWT Authorization: Avoiding Common Pitfalls | AuthZed.com
JWT Authorization: Avoiding Common Pitfalls | AuthZed.com
Discover the limitations of JWTs for backend authorization and the benefits of centralized authorization with fine-grained access control. Explore AuthZed's SpiceDB and ReBAC foundation.
·authzed.com·
JWT Authorization: Avoiding Common Pitfalls | AuthZed.com
Relationship Based Access Control (ReBAC): Using Graphs to Power your Authorization System | AuthZed
Relationship Based Access Control (ReBAC): Using Graphs to Power your Authorization System | AuthZed
Learn why authentication and authorization are distinct systems, and why relying on attribute-based permission systems can lead to security vulnerabilities. Discover how ReBAC can lead to more robust permission systems that mimic the way people naturally organize their world.
·authzed.com·
Relationship Based Access Control (ReBAC): Using Graphs to Power your Authorization System | AuthZed
Fine-Grained Access Control: Can You Go Too Fine? | AuthZed.com
Fine-Grained Access Control: Can You Go Too Fine? | AuthZed.com
Learn about the advantages and disadvantages of fine-grained access control and how to model permissions for your app efficiently. Find out how to strike a balance between security, performance, and user experience.
·authzed.com·
Fine-Grained Access Control: Can You Go Too Fine? | AuthZed.com
Building Scalable Permission Systems with Caveated Relationships | AuthZed.com
Building Scalable Permission Systems with Caveated Relationships | AuthZed.com
Reduce the risk of creating a legacy bespoke system with Authzed's suite of authorization tooling, including SpiceDB, an open-source solution for implementing fine-grained permissions modeled on ABAC and now featuring caveats for dynamic policies.
·authzed.com·
Building Scalable Permission Systems with Caveated Relationships | AuthZed.com
ABAC on SpiceDB: Enabling Netflix’s Complex Identity Types
ABAC on SpiceDB: Enabling Netflix’s Complex Identity Types
Learn how AuthZed and Netflix bridged the gap between Policy-Based and Relationship-Based Access Control by adding ABAC to AuthZed's Google Zanzibar-inspired authorization system—SpiceDB.
·authzed.com·
ABAC on SpiceDB: Enabling Netflix’s Complex Identity Types
Document Verification Technology: A Step by Step Guide - MiniAiLive
Document Verification Technology: A Step by Step Guide - MiniAiLive
Document verification technology authenticates the validity of physical and digital documents. It ensures that personal and sensitive information remains secure. In today's digital age, document verification serves as a critical component for businesses in various sectors, including banking, healthcare, and government services. It utilizes a mix of artificial intelligence, machine learning, and pattern recognition to
·miniai.live·
Document Verification Technology: A Step by Step Guide - MiniAiLive
Using X.509 Certs for DID Provenance
Using X.509 Certs for DID Provenance
The abundance of X.509 certificate authorities who already perform identity proofing for businesses provides a rich resource that can be leveraged to boot the verifiable data ecosystem.
·windley.com·
Using X.509 Certs for DID Provenance
Protobom: Paving the Path for SBOM Adoption
Protobom: Paving the Path for SBOM Adoption
CISA, DHS, and OpenSSF are introducing Protobom, an open source tool they say will make it easier for enterprises protect their software supply chains.
·thenewstack.io·
Protobom: Paving the Path for SBOM Adoption
Kobold letters – Lutra Security
Kobold letters – Lutra Security
Anyone who has had to deal with HTML emails on a technical level has probably reached the point where they wanted to quit their job or just set fire to all the mail clients due to their inconsistent implementations. But HTML emails are not just a source of frustration, they can also be a serious security risk.
·lutrasecurity.com·
Kobold letters – Lutra Security
This Week In Security: XZ, ATT, And Letters Of Marque
This Week In Security: XZ, ATT, And Letters Of Marque
The xz backdoor is naturally still the top story of the week. If you need a refresher, see our previous coverage. As expected, some very talented reverse engineers have gone to work on the code, an…
·hackaday.com·
This Week In Security: XZ, ATT, And Letters Of Marque
Content Security Policy (CSP) - HTTP | MDN
Content Security Policy (CSP) - HTTP | MDN
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross-Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft, to site defacement, to malware distribution.
·developer.mozilla.org·
Content Security Policy (CSP) - HTTP | MDN
How to spot and avoid Facebook 'Like' scams
How to spot and avoid Facebook 'Like' scams
When you click or press the Like button, you may be disclosing more about yourself than you imagine. You may also be contributing to the bank accounts of Internet scammers.
·cnet.com·
How to spot and avoid Facebook 'Like' scams
Securing the Web PKI
Securing the Web PKI
CITP is releasing a report today based on a two day in-person workshop on the security of the Web Public Key Infrastructure (Web PKI) we held last year.
·freedom-to-tinker.com·
Securing the Web PKI