Data Safety and Information Security

Data Safety and Information Security

641 bookmarks
Custom sorting
Infrastructure Laundering: Blending in with the Cloud
Infrastructure Laundering: Blending in with the Cloud
In an effort to blend in and make their malicious traffic tougher to block, hosting firms catering to cybercriminals in China and Russia increasingly are funneling their operations through major U.S. cloud providers. Research published this week on one such…
·krebsonsecurity.com·
Infrastructure Laundering: Blending in with the Cloud
MasterCard DNS Error Went Unnoticed for Years
MasterCard DNS Error Went Unnoticed for Years
The payment card giant MasterCard just fixed a glaring error in its domain name server settings that could have allowed anyone to intercept or divert Internet traffic for the company by registering an unused domain name. The misconfiguration persisted for…
·krebsonsecurity.com·
MasterCard DNS Error Went Unnoticed for Years
Downloads
Downloads
·opsec.riotmedicine.net·
Downloads
Humane Intelligence | Advancing AI Auditing & Impact
Humane Intelligence | Advancing AI Auditing & Impact
Humane Intelligence is a tech nonprofit. A platform for model evaluators & learners to professionalize algorithmic auditing and real-time AI impact assessments.
·humane-intelligence.org·
Humane Intelligence | Advancing AI Auditing & Impact
Gram
Gram
A free open source social media platform without ads or tracking! Connect with millions of people around the world on the Fediverse (Federated Universe).
·gram.social·
Gram
iocaine
iocaine
The deadliest poison known to AI
·git.madhouse-project.org·
iocaine
The long and winding road to safe browser-based cryptography
The long and winding road to safe browser-based cryptography
Browser-based cryptography has struggled with a longstanding chicken-and-egg problem that predates many features of the modern web, and while some of those features have reduced the problem’s severity, the issue remains: What is the basis for trusting the code that performs browser-based encryption?
·securedrop.org·
The long and winding road to safe browser-based cryptography
Authorization Matters
Authorization Matters
I've become very interested in the topic of authorization over the last year and plan to write about it more. I hope you'll follow along.
·windley.com·
Authorization Matters
Block AI scrapers with Anubis
Block AI scrapers with Anubis
I got tired with all the AI scrapers that were bullying my git server, so I made a tool to stop them for good.
·xeiaso.net·
Block AI scrapers with Anubis
Google open sources software composition analysis library
Google open sources software composition analysis library
Software composition analysis (SCA) is a process undertaken to identify and track application code dependencies and also track security and compliance Google has open sourced OSV-SCALIBR (Software Composition Analysis LIBRary). With open source vulnerability (OSV) issues always in the spotlight, this could be a welcome development.
·techzine.eu·
Google open sources software composition analysis library
OPAL - an Authorization Service for Fine-Grained Permissions
OPAL - an Authorization Service for Fine-Grained Permissions
Open Policy Administration Layer (OPAL) is an open-source administration layer for OPA and AWS' Cedar Agent that allows you to keep your authorization layer up-to-date in real time
·permit.io·
OPAL - an Authorization Service for Fine-Grained Permissions
New Bambu Lab Firmware Update Adds Mandatory Authorization Control System
New Bambu Lab Firmware Update Adds Mandatory Authorization Control System
As per a recent Bambu Lab blog post, its FDM printers in the X1 series will soon receive a firmware update that adds mandatory authentication for certain operations, starting with the firmware upda…
·hackaday.com·
New Bambu Lab Firmware Update Adds Mandatory Authorization Control System
Policy as Code | From Infrastructure to Fine-Grained Authorization
Policy as Code | From Infrastructure to Fine-Grained Authorization
Learn about Policy as Code, its use cases, and challenges from leading software developers. Discover tools and frameworks for policy as code implementation, and dive into policy languages like Rego, Cedar, and OpenFGA.
·permit.io·
Policy as Code | From Infrastructure to Fine-Grained Authorization
Mail-in Apostille in California
Mail-in Apostille in California
An Apostille is similar to notarization to certify a document, but intended for use in another country. Apostille is defined by a Hague conv...
·codingrelic.geekhold.com·
Mail-in Apostille in California
Top 5 Cyber Resilience Issues for Network Devices
Top 5 Cyber Resilience Issues for Network Devices
Why is the cyber resilience of network devices lagging and what can you do about it? The answer: Leverage automation.
·networkcomputing.com·
Top 5 Cyber Resilience Issues for Network Devices
A Note from our Executive Director
A Note from our Executive Director
This letter was originally published in our 2024 Annual Report. The past year at ISRG has been a great one and I couldn’t be more proud of our staff, community, funders, and other partners that made it happen. Let’s Encrypt continues to thrive, serving more websites around the world than ever before with excellent security and stability. Our understanding of what it will take to make more privacy-preserving metrics more mainstream via our Divvi Up project is evolving in important ways.
·letsencrypt.org·
A Note from our Executive Director
The Simple Math Behind Public Key Cryptography
The Simple Math Behind Public Key Cryptography
The security system that underlies the internet makes use of a curious fact: You can broadcast part of your encryption to make your information much more secure.
·wired.com·
The Simple Math Behind Public Key Cryptography