Data Safety and Information Security

Data Safety and Information Security

676 bookmarks
Custom sorting
EBCDIC is incompatible with GDPR
EBCDIC is incompatible with GDPR
Welcome to acronym city! The Court of Appeal of Brussels has made an interesting ruling. A customer complained that their bank was spelling the customer’s name incorrectly. The bank didn&#821…
·shkspr.mobi·
EBCDIC is incompatible with GDPR
Sequoia-PGP
Sequoia-PGP
Sequoia is a modular OpenPGP implementation in Rust.
·sequoia-pgp.org·
Sequoia-PGP
NFTs, Verifiable Credential, and Picos
NFTs, Verifiable Credential, and Picos
The hype over NFTs and collectibles is blinding us to their true usefulness as trustworthy persistent data objects. How do they sit in the landscape with verifiable credentials and picos?
·windley.com·
NFTs, Verifiable Credential, and Picos
Delivering 10,000 security keys to high risk users
Delivering 10,000 security keys to high risk users
Google’s Advanced Protection Program (APP) improves account security for highly visible at-risk groups, such as elected officials, political campaigns, human rights activists and journalists.
·blog.google·
Delivering 10,000 security keys to high risk users
4 Container Orchestration Security Concerns
4 Container Orchestration Security Concerns
If you’re looking to use container-based applications, you may want to keep in mind the security risks that come with this technology.
·devops.com·
4 Container Orchestration Security Concerns
6 Kubernetes Security Best Practices - The New Stack
6 Kubernetes Security Best Practices - The New Stack
Regardless of where you deploy, this post will help you get a clearer understanding of your role and your options for securing Kubernetes.
·thenewstack.io·
6 Kubernetes Security Best Practices - The New Stack
Cyber security in the public cloud
Cyber security in the public cloud
A brief guide to the network, infrastructure, data, and application security capabilities AWS, Microsoft Azure, and Google Cloud provide to prevent cyber attacks and protect your cloud-based resources and workloads.
·infoworld.com·
Cyber security in the public cloud
How to verify checksum on Mac
How to verify checksum on Mac
Verifying SHA-512, SHA-256, SHA-1 and MD5 checksum on Mac using Terminal
·medium.com·
How to verify checksum on Mac
Gift cards, serial numbers and hard technology
Gift cards, serial numbers and hard technology
I bought someone a digital gift card the other day. That’s generally a bad idea, since there’s so much waste and breakage, but it was the right answer to the problem in the moment. The …
·seths.blog·
Gift cards, serial numbers and hard technology
How Do Authentication and Authorization Differ? - The New Stack
How Do Authentication and Authorization Differ? - The New Stack
While related, authentication and authorization are two different concepts that need to be separate steps in an access policy and may well be managed by different teams using different tools.
·thenewstack.io·
How Do Authentication and Authorization Differ? - The New Stack
Is there a way out of password hell?
Is there a way out of password hell?
Passwords are hell. Worse, to make your hundreds of passwords safe as possible, they should be nearly impossible for others to discover—and for you to remember. Unless you’re a wizard, this a…
·blogs.harvard.edu·
Is there a way out of password hell?
Fluid Multi-Pseudonymity
Fluid Multi-Pseudonymity
Fluid multi-pseudonymity perfectly describes the way we live our lives and the reality that identity systems must realize if we are to live authentically in the digital sphere.
·windley.com·
Fluid Multi-Pseudonymity
How does Google Authenticator work? (Part 1)
How does Google Authenticator work? (Part 1)
When you’re accessing services over the WEB – let’s pick GMail as an example – couple of things have to happen upfront: The server you’re connecting to (GMail in our example) has to get to know who you are. Only after getting to know who you are it’s able to decide what resources you are allowed to access (e.g. your own email inbox, your Calendar, Drive etc.). Step 1 above is called authentication.
·prezu.ca·
How does Google Authenticator work? (Part 1)