Data Safety and Information Security

Data Safety and Information Security

641 bookmarks
Custom sorting
Acceptance Networks for Self-Sovereign Identity
Acceptance Networks for Self-Sovereign Identity
We can't have broad adoption of verifiable credentials until we find a way to scale their presentation by providing tooling that credential verifiers can use to reduce their risk and gain confidence in the facts presented to them.
·windley.com·
Acceptance Networks for Self-Sovereign Identity
Level up: Gamify Your Software Security
Level up: Gamify Your Software Security
Incorporating game-like elements can encourage developers to not only prioritize security, but do so in an engaging and rewarding way.
·thenewstack.io·
Level up: Gamify Your Software Security
On the matter of the British Library cyber incident
On the matter of the British Library cyber incident
The most important lesson to figure out is why it is taking so long to restore services. That will tell us how to prevent such a calamity in other vital national institutions.
·ciaranmartin.substack.com·
On the matter of the British Library cyber incident
Locking Down The Edge
Locking Down The Edge
COMMISSIONED: Edge security is a growing headache. The attack surface is expanding as more operational functions migrate out of centralized locations and
·nextplatform.com·
Locking Down The Edge
3 Steps to Reclaiming Your Online Privacy and Security (Part I) - Universal Journal
3 Steps to Reclaiming Your Online Privacy and Security (Part I) - Universal Journal
Explore Zone One, the crucial starting point for bolstering your online privacy and security. Discover essential steps to safeguard your digital life, from password management to minimizing your digital footprint. Take control of your online presence and learn how to protect your personal information effectively.
·universaljournal.net·
3 Steps to Reclaiming Your Online Privacy and Security (Part I) - Universal Journal
How to lock down backup infrastructure
How to lock down backup infrastructure
Ransomware that's aimed at backup infrastructure can put critical backup repositories at risk as well as expose a treasure trove of corporate data.
·networkworld.com·
How to lock down backup infrastructure
How to Not Get Hacked by a QR Code
How to Not Get Hacked by a QR Code
QR codes can be convenient—but they can also be exploited by malicious actors. Here’s how to protect yourself.
·wired.com·
How to Not Get Hacked by a QR Code
Our Take on Verifiable Credentials
Our Take on Verifiable Credentials
An in-depth explanation on Verifiable Credentials from identity first principles, and how and why we think they will happen
·auth0.com·
Our Take on Verifiable Credentials
Database reconstruction attacks
Database reconstruction attacks
Database reconstruction allows an attacker to recover raw data from reported statistics. US Census data prior to 2020 was vulnerable to reconstruction attacks.
·johndcook.com·
Database reconstruction attacks
Why Your API Keys Are Leaving You Vulnerable to Attack
Why Your API Keys Are Leaving You Vulnerable to Attack
Though the name sounds secure, API keys do not offer robust security. Sensitive data requires a more fortified form of protection, such as tokens.
·thenewstack.io·
Why Your API Keys Are Leaving You Vulnerable to Attack
Internet Identity Workshop 37 Report
Internet Identity Workshop 37 Report
The latest IIW was great with many high intensity discussions of identity by people from across the globe.
·windley.com·
Internet Identity Workshop 37 Report
Container Security and the Importance of Secure Runtimes
Container Security and the Importance of Secure Runtimes
Learn how container runtimes work, why tightly coupled runtimes can lead to host takeover if an attacker escapes a container, and the benefits of secure container runtimes like gVisor and Kata Containers.
·thenewstack.io·
Container Security and the Importance of Secure Runtimes
Don’t Let Zombie Zoom Links Drag You Down
Don’t Let Zombie Zoom Links Drag You Down
Many organizations — including quite a few Fortune 500 firms — have exposed web links that allow anyone to initiate a Zoom video conference meeting as a valid employee. These company-specific Zoom links, which include a permanent user ID number…
·krebsonsecurity.com·
Don’t Let Zombie Zoom Links Drag You Down