Data Safety and Information Security

Data Safety and Information Security

676 bookmarks
Custom sorting
What’s The Art of War got to do with cybercrime? Quite a bit, actually. | Microsoft Security Blog
What’s The Art of War got to do with cybercrime? Quite a bit, actually. | Microsoft Security Blog
Sun Tzu wrote that mastery in the art of war is about subduing one’s enemy without having to fight. As the modern world contends with increasingly sophisticated cyberattacks from both criminal and political adversaries, this 2500-year-old cliché is key to enterprise security strategy. Today, the “bad guys” of the Internet are both professional in their…
·microsoft.com·
What’s The Art of War got to do with cybercrime? Quite a bit, actually. | Microsoft Security Blog
Steganography Decoded
Steganography Decoded
What exactly is Steganography?
·blog.octachart.com·
Steganography Decoded
Design for Safety, An Excerpt
Design for Safety, An Excerpt
None of us want to build products that put our users’ safety at risk, but how do you reduce the risk that our products will be weaponized by abusers? In this excerpt from Design for Safety, Eva Pen…
·alistapart.com·
Design for Safety, An Excerpt
The Case for Granular Permissions
The Case for Granular Permissions
When it comes to implementing access control in your application, the scheme you decide to use can either make authorization easy to manage as your application and user base grows, or it can really paint you into a corner.
·cerbos.dev·
The Case for Granular Permissions
GitHub Kisses Passwords Goodbye - The New Stack
GitHub Kisses Passwords Goodbye - The New Stack
The top developer site GitHub has had enough second-rate security. So, as of August 13th, GitHub blocked the use of account passwords when authenticating Git operations.
·thenewstack.io·
GitHub Kisses Passwords Goodbye - The New Stack
Command Line Login with the OAuth Device Grant
Command Line Login with the OAuth Device Grant
Tutorial: Learn how to log into input limited devices like TVs and terminals using the OAuth 2.0 Device Grant!
·developer.okta.com·
Command Line Login with the OAuth Device Grant
Firewalls and middleboxes can be weaponized for gigantic DDoS attacks
Firewalls and middleboxes can be weaponized for gigantic DDoS attacks
In an award-winning paper today, academics said they discovered a way to abuse the TCP protocol, firewalls, and other network middleboxes to launch giant distributed denial of service (DDoS) attacks against any target on the internet.
·therecord.media·
Firewalls and middleboxes can be weaponized for gigantic DDoS attacks
CrowdSec, the open-source massively multiplayer firewall
CrowdSec, the open-source massively multiplayer firewall
CrowdSec is a collaborative EDR leveraging the crowd power. Analyze behaviors, respond to attacks & share signals across the community. Security should be accessible to everyone. We make it happen. For free. Join our community and let's make the Internet safer, together.
·crowdsec.net·
CrowdSec, the open-source massively multiplayer firewall