Data Safety and Information Security

Data Safety and Information Security

641 bookmarks
Custom sorting
HTTP Sig Demo
HTTP Sig Demo
How to secure BigData or microservices efficiently on the Web
·medium.com·
HTTP Sig Demo
Keyoxide
Keyoxide
Modern and secure platform to manage a decentralized identity based on cryptographic keys
·keyoxide.org·
Keyoxide
Blog: Google's Threat model for Post-Quantum Cryptography
Blog: Google's Threat model for Post-Quantum Cryptography
Read on to understand how Google currently evaluates the threat landscape related to post-quantum cryptography, and what implications this has for migrating from classical cryptographic algorithms to PQC.
·bughunters.google.com·
Blog: Google's Threat model for Post-Quantum Cryptography
3 Steps to Make Logins with Passkeys Reliable
3 Steps to Make Logins with Passkeys Reliable
When I first used passkeys, I felt they had too many issues to be used in production, but I’ve changed my mind. I recommend these steps for using them.
·thenewstack.io·
3 Steps to Make Logins with Passkeys Reliable
Musings on Auth: How do we authenticate?
Musings on Auth: How do we authenticate?
Authentication is central to securing applications and enabling personalised websites. This post discusses the different forms of authentication used in software.
·nicholashairs.com·
Musings on Auth: How do we authenticate?
🔐 The Best Memorable Password Generator ever!
🔐 The Best Memorable Password Generator ever!
The Best Memorable Password Generator ever that is completely free. Easily create secure, unique and strong passwords in no time.
·memorablepasswordgenerator.com·
🔐 The Best Memorable Password Generator ever!
Row Level Security | Tutorials | Crunchy Data
Row Level Security | Tutorials | Crunchy Data
Learn how to use Postgres’ Row Level Security functionality. It’s a great tool for managing key-based partitioning in a multi-tenant world.
·crunchydata.com·
Row Level Security | Tutorials | Crunchy Data
How to stay safe from repo-jacking
How to stay safe from repo-jacking
Repo-jacking is a specific type of supply chain attack. This blog post explains what it is, what the risk is, and what you can do to stay safe.
·github.blog·
How to stay safe from repo-jacking
The "KeyTrap" DNS vulnerability
The "KeyTrap" DNS vulnerability
DNS resolvers (those that handle DNSSEC, at least) are almost uniformly vulnerable to an exploit that has been named "KeyTrap". In short, the right type of packet can send a DNS system into something close to an infinite loop, taking it out of service indefinitely.
·lwn.net·
The "KeyTrap" DNS vulnerability
How are WLAN Infrastructures in Enterprises Secured?
How are WLAN Infrastructures in Enterprises Secured?
Learn about the scalability challenges of Pre-shared (PSK) configurations in the enterprise, as well as how 802.1X addresses and resolves them elegantly.
·tbhaxor.com·
How are WLAN Infrastructures in Enterprises Secured?
Zero Trust with Zero Data
Zero Trust with Zero Data
The physical world is full of zero trust examples, but they gather attributes for the access control decisions in a very different way than we're used to online.
·windley.com·
Zero Trust with Zero Data
Zero Trust made simple
Zero Trust made simple
Rest assured, adopting a Zero Trust strategy need not be overwhelming or complicated —we encourage gradual implementation and highlight the potential for steady progress and strengthened resilience within any organization. Get started on your Zero Trust journey today.
·networkworld.com·
Zero Trust made simple
Phishing Impact Test Shows the Specific Likely Harms to The Organization Should an Employee's Credentials Be Stolen : @VMblog
Phishing Impact Test Shows the Specific Likely Harms to The Organization Should an Employee's Credentials Be Stolen : @VMblog
Phishing Impact testing from autonomous pentesting company Horizon3.ai fills a knowledge gap by providing organizations with the precise impacts and likely outcomes of a successful phishing campaign on their particular organization and systems, should
·vmblog.com·
Phishing Impact Test Shows the Specific Likely Harms to The Organization Should an Employee's Credentials Be Stolen : @VMblog
Privacy and PDF metadata | forensics
Privacy and PDF metadata | forensics
When you create a PDF file, what you see is not all you get. You also include metadata that you may not be aware of.
·johndcook.com·
Privacy and PDF metadata | forensics
Relationship Based Access Control (ReBAC): When To Use It
Relationship Based Access Control (ReBAC): When To Use It
We will examine Relationship Based Access Control (ReBAC) and its common models that you should not try to implement with roles (RBAC) or attributes (ABAC) to avoid technical debt and security breaches.
·permify.co·
Relationship Based Access Control (ReBAC): When To Use It