security
- Self-Signed Certificates (10 Nov 2024)
How to create your own CA and why this is useful - Dual-Use: How AI is Shaping the Future of Cybersecurity (05 May 2023)
Artificial intelligence's pivotal role in threatening and strengthening cybersecurity - The Lightning Network - Revolutionizing Bitcoin Transactions (06 Mar 2023)
Revolutionizing Bitcoin Payments with the Lightning Network - ATT&CK - Threat Intelligence (25 Jan 2023)
a comprehensive view of adversary tactics and techniques - Semgrep - Security Testing (21 Jan 2023)
static application security testing with semgrep - Roundup October 2022 (31 Oct 2022)
Technology and Security News from October 2022 - Roundup September 2022 (29 Sep 2022)
Technology and Security News from September 2022 - Roundup August 2022 (30 Aug 2022)
Technology and Security News from August 2022 - Roundup July 2022 (31 Jul 2022)
Technology and Security News from July 2022 - Roundup June 2022 (26 Jun 2022)
Technology and Security News from June 2022 - Cloud Security Toolkit (01 Jun 2022)
Fast paced development change the security requirements - Roundup May 2022 (29 May 2022)
Technology and Security News from May 2022 - CVSS - The Vulnerability Scoring System (21 May 2022)
The Common Vulnerability Scoring System helps to assess vulnerabilities - OWASP Software Assurance Maturity Model (29 Apr 2022)
An open framework for a tailored software security strategy - Roundup April 2022 (25 Apr 2022)
Technology and Security News from April 2022 - Roundup March 2022 (22 Mar 2022)
Technology and Security News from March 2022 - Secure Development - Lifecycle Models (09 Feb 2021)
Secure Software and System Development - lifecycle - Secure Development - Basic Principles (06 Feb 2021)
Secure Software and System Development - Requirements - Secure Development - Programming Languages (20 Jan 2021)
Secure Software and System Development - Programming Languages - Tor - 25 Years of Anonymization (30 Nov 2020)
The great anonymization project - CVE - The Common Vulnerabilities and Exposures System (01 Nov 2020)
Overview of the CVE System - Zero Trust Security (28 Aug 2020)
never trust, always verify - Data Anonymization (04 Aug 2020)
Anonymized is not anonymous - Network Vulnerability Scanner (12 Jul 2020)
detect vulnerabilities in networks - Security Awareness - Security Culture (12 May 2020)
Building a strong security culture - Security Awareness - Threat Landscape (01 May 2020)
Overview of attacks and actors - System Architecture - Shift To The Client (16 Feb 2020)
The impact of privacy laws on System Design - TCP/IP - Internet Protocol Suite (29 Jan 2020)
The Internet protocol suite is a set of protocols used in the Internet and similar computer networks. - OSI Model - Open Systems Interconnection (12 Jan 2020)
A conceptual model that characterizes and standardizes the communication of systems. - The Holiday Gift Guide (27 Nov 2019)
Secure Gifts for the Holiday Season. A end of the year list of gift ideas to my readers. - U2F - Universal 2nd Factor Authentication (14 Nov 2019)
A secure authentication standard created by the FIDO Alliance - OWASP Top 10 Application Security Risks (15 Oct 2019)
The OWASP Top 10 is a regularly-updated report documenting security concerns for web applications most critical risks. - Cryptographic Deletion (08 Oct 2019)
Secure deletion is a requirement in times of cloud computing and GDPR - PGP - The Web of Trust is Dead (06 Aug 2019)
Signature Spam kills WoT - Password Entropy (11 Jun 2019)
Entropy in Passwords, how to calculate it and what it actually means - Adaptive Transaction Security by Contact Frequency (27 May 2019)
When the frequence of interaction between people defines the security level - Cryptography - Applications (24 May 2019)
Applied Cryptography - Cryptography - Hash Functions & Digital Signatures (21 May 2019)
Hash Functions & Digital Signatures - Personnel Security (19 May 2019)
PERSEC - Policies and Procedures for Personnel Security - Cryptography - Asymmetric Key Algorithms (16 May 2019)
Public-Key Cryptography - Cryptography - Symmetric Key Algorithms (14 May 2019)
Symmertric Cryptography - Cryptography - History & Basics (12 May 2019)
The history and basics of Cryptography - Data Classification (09 May 2019)
a structured approach to protect valuable resources and assets - Cyberwar - A Sci-Fi Reality (06 May 2019)
How Cyberpunk predicted the future - The CIA Triad - Confidentiality, Integrity, and Availability (02 May 2019)
CIA - the primary goals and objectives of a security infrastructure - Security Risk Assessment (30 Apr 2019)
How to perform a Cyber Security Risk Assessment - GDPR, Passwords, Hashing and You (24 Apr 2019)
New obligations regarding password systems - Software Supply Chain Security (19 Apr 2019)
Prevent Software Supply Chain Attacks - Vulnerability Disclosure at SignUp (18 Apr 2019)
Disclosure of Account Vulnerabilities during SignUp avoid credential stuffing attack - Fraud Detection with GPS and Airplanes (17 Apr 2019)
Fraud Detection with Haversine - PKI - Public Key Infrastructure (16 Apr 2019)
PKI Concepts