Data Safety and Information Security

Data Safety and Information Security

676 bookmarks
Custom sorting
Top 5 Cyber Resilience Issues for Network Devices
Top 5 Cyber Resilience Issues for Network Devices
Why is the cyber resilience of network devices lagging and what can you do about it? The answer: Leverage automation.
·networkcomputing.com·
Top 5 Cyber Resilience Issues for Network Devices
A Note from our Executive Director
A Note from our Executive Director
This letter was originally published in our 2024 Annual Report. The past year at ISRG has been a great one and I couldn’t be more proud of our staff, community, funders, and other partners that made it happen. Let’s Encrypt continues to thrive, serving more websites around the world than ever before with excellent security and stability. Our understanding of what it will take to make more privacy-preserving metrics more mainstream via our Divvi Up project is evolving in important ways.
·letsencrypt.org·
A Note from our Executive Director
The Simple Math Behind Public Key Cryptography
The Simple Math Behind Public Key Cryptography
The security system that underlies the internet makes use of a curious fact: You can broadcast part of your encryption to make your information much more secure.
·wired.com·
The Simple Math Behind Public Key Cryptography
On passwords
On passwords
zudell.io._ blog
·zudell.io·
On passwords
Trust Issues - Schneier on Security
Trust Issues - Schneier on Security
This essay appeared as a response in Boston Review‘s forum, “The AI We Deserve.” For a technology that seems startling in its modernity, AI sure has a long history. Google Translate, OpenAI chatbots, and Meta AI image generators are built on decades of advancements in linguistics, signal processing, statistics, and other fields going back to the early days of computing—and, often, on seed funding from the U.S. Department of Defense. But today’s tools are hardly the intentional product of the diverse generations of innovators that came before. We agree with Morozov that the “refuseniks,” as he ...
·schneier.com·
Trust Issues - Schneier on Security
Free Custom Temporary Email Address - Temp Mail
Free Custom Temporary Email Address - Temp Mail
Keep your real email inbox clean. Temporary emails are perfect for any transaction where you want to improve your online privacy. Use our disposable email addresses for ad blocking, no spam, no ads, just temporary mail.
·freecustom.email·
Free Custom Temporary Email Address - Temp Mail
What To Use Instead of PGP - Dhole Moments
What To Use Instead of PGP - Dhole Moments
It’s been more than five years since The PGP Problem was published, and I still hear from people who believe that using PGP (whether GnuPG or another OpenPGP implementation) is a thing they s…
·soatok.blog·
What To Use Instead of PGP - Dhole Moments
Listen to the whispers: web timing attacks that actually work
Listen to the whispers: web timing attacks that actually work
Websites are riddled with timing oracles eager to divulge their innermost secrets. It's time we started listening to them. In this paper, I'll unleash novel attack concepts to coax out server secrets
·portswigger.net·
Listen to the whispers: web timing attacks that actually work
Encrypting Personally Identifiable Information at rest in Marten documents
Encrypting Personally Identifiable Information at rest in Marten documents
Protecting Personally Identifiable Information (PII) has become essential as organizations handle increasing volumes of sensitive data. Regulations like the GDPR (General Data Protection Regulation) mandate strict controls over PII to safeguard indiv...
·mysticmind.dev·
Encrypting Personally Identifiable Information at rest in Marten documents
How Public Key Cryptography Really Works | Quanta Magazine
How Public Key Cryptography Really Works | Quanta Magazine
The security system that underlies the internet makes use of a curious fact: You can broadcast part of your encryption to make your information much more secure.
·quantamagazine.org·
How Public Key Cryptography Really Works | Quanta Magazine
The WIRED Guide to Protecting Yourself From Government Surveillance
The WIRED Guide to Protecting Yourself From Government Surveillance
Donald Trump has vowed to deport millions and jail his enemies. To carry out that agenda, his administration will exploit America’s digital surveillance machine. Here are some steps you can take to evade it.
·wired.com·
The WIRED Guide to Protecting Yourself From Government Surveillance
Securityeducationcompanion
Securityeducationcompanion
A free resource for digital security educators
·securityeducationcompanion.org·
Securityeducationcompanion