Data Safety and Information Security

Data Safety and Information Security

641 bookmarks
Custom sorting
NFTs, Verifiable Credential, and Picos
NFTs, Verifiable Credential, and Picos
The hype over NFTs and collectibles is blinding us to their true usefulness as trustworthy persistent data objects. How do they sit in the landscape with verifiable credentials and picos?
·windley.com·
NFTs, Verifiable Credential, and Picos
Delivering 10,000 security keys to high risk users
Delivering 10,000 security keys to high risk users
Google’s Advanced Protection Program (APP) improves account security for highly visible at-risk groups, such as elected officials, political campaigns, human rights activists and journalists.
·blog.google·
Delivering 10,000 security keys to high risk users
4 Container Orchestration Security Concerns
4 Container Orchestration Security Concerns
If you’re looking to use container-based applications, you may want to keep in mind the security risks that come with this technology.
·devops.com·
4 Container Orchestration Security Concerns
6 Kubernetes Security Best Practices - The New Stack
6 Kubernetes Security Best Practices - The New Stack
Regardless of where you deploy, this post will help you get a clearer understanding of your role and your options for securing Kubernetes.
·thenewstack.io·
6 Kubernetes Security Best Practices - The New Stack
Cyber security in the public cloud
Cyber security in the public cloud
A brief guide to the network, infrastructure, data, and application security capabilities AWS, Microsoft Azure, and Google Cloud provide to prevent cyber attacks and protect your cloud-based resources and workloads.
·infoworld.com·
Cyber security in the public cloud
How to verify checksum on Mac
How to verify checksum on Mac
Verifying SHA-512, SHA-256, SHA-1 and MD5 checksum on Mac using Terminal
·medium.com·
How to verify checksum on Mac
Gift cards, serial numbers and hard technology
Gift cards, serial numbers and hard technology
I bought someone a digital gift card the other day. That’s generally a bad idea, since there’s so much waste and breakage, but it was the right answer to the problem in the moment. The …
·seths.blog·
Gift cards, serial numbers and hard technology
How Do Authentication and Authorization Differ? - The New Stack
How Do Authentication and Authorization Differ? - The New Stack
While related, authentication and authorization are two different concepts that need to be separate steps in an access policy and may well be managed by different teams using different tools.
·thenewstack.io·
How Do Authentication and Authorization Differ? - The New Stack
Is there a way out of password hell?
Is there a way out of password hell?
Passwords are hell. Worse, to make your hundreds of passwords safe as possible, they should be nearly impossible for others to discover—and for you to remember. Unless you’re a wizard, this a…
·blogs.harvard.edu·
Is there a way out of password hell?
Fluid Multi-Pseudonymity
Fluid Multi-Pseudonymity
Fluid multi-pseudonymity perfectly describes the way we live our lives and the reality that identity systems must realize if we are to live authentically in the digital sphere.
·windley.com·
Fluid Multi-Pseudonymity
How does Google Authenticator work? (Part 1)
How does Google Authenticator work? (Part 1)
When you’re accessing services over the WEB – let’s pick GMail as an example – couple of things have to happen upfront: The server you’re connecting to (GMail in our example) has to get to know who you are. Only after getting to know who you are it’s able to decide what resources you are allowed to access (e.g. your own email inbox, your Calendar, Drive etc.). Step 1 above is called authentication.
·prezu.ca·
How does Google Authenticator work? (Part 1)
What’s The Art of War got to do with cybercrime? Quite a bit, actually. | Microsoft Security Blog
What’s The Art of War got to do with cybercrime? Quite a bit, actually. | Microsoft Security Blog
Sun Tzu wrote that mastery in the art of war is about subduing one’s enemy without having to fight. As the modern world contends with increasingly sophisticated cyberattacks from both criminal and political adversaries, this 2500-year-old cliché is key to enterprise security strategy. Today, the “bad guys” of the Internet are both professional in their…
·microsoft.com·
What’s The Art of War got to do with cybercrime? Quite a bit, actually. | Microsoft Security Blog
Steganography Decoded
Steganography Decoded
What exactly is Steganography?
·blog.octachart.com·
Steganography Decoded
Design for Safety, An Excerpt
Design for Safety, An Excerpt
None of us want to build products that put our users’ safety at risk, but how do you reduce the risk that our products will be weaponized by abusers? In this excerpt from Design for Safety, Eva Pen…
·alistapart.com·
Design for Safety, An Excerpt
The Case for Granular Permissions
The Case for Granular Permissions
When it comes to implementing access control in your application, the scheme you decide to use can either make authorization easy to manage as your application and user base grows, or it can really paint you into a corner.
·cerbos.dev·
The Case for Granular Permissions
GitHub Kisses Passwords Goodbye - The New Stack
GitHub Kisses Passwords Goodbye - The New Stack
The top developer site GitHub has had enough second-rate security. So, as of August 13th, GitHub blocked the use of account passwords when authenticating Git operations.
·thenewstack.io·
GitHub Kisses Passwords Goodbye - The New Stack