Tag: Infosec
-
How to find hidden cameras and spy gear like a professional: the definitive guide
Posted on January 17, 2019, Level beginner Resource Length long
Detailed article published on senteltechsecurity.com describing the most thorough guide to detecting hidden cameras and covert spy gear that is online.
Tags miscellaneous infosec
-
Predictive Analytics: the future of digital marketing
Posted on December 9, 2018, Level beginner Resource Length long
An older blog post by Deepak Kanakaraju on hot topic of predictive analytics. As technology impacts every aspect of our lives, it is also creating an impact in predicting the future, with reasonable accuracy.
Tags big-data machine-learning analytics infosec
-
How military-style training may enhance your cybersecurity strategy
Posted on November 22, 2018, Level beginner Resource Length medium
Article by Michael Kassner about the facility offering realistic cybersecurity training modeled on the approach used by the military and first responders.
Tags ibm cloud devops infosec servers
-
How to use SSL/TLS with Node.js
Posted on November 14, 2018, Level intermediate Resource Length long
Detailed article by Almir Bijedic and Florian Rappl about setting up Node.js with SSL/TLS. Let's Encrypt works beautifully, and having an SSL-secured site is easier than ever.
Tags infosec nodejs web-development performance
-
NGINX Unit supports TLS and JavaScript apps with Node.js
Posted on November 3, 2018, Level beginner Resource Length medium
Nick Shadrin of NGINX, Inc. wrote this article about TLS and Nodejs apps support in NGINX Unit. NGINX Unit is a dynamic web and application server, designed to run applications in multiple languages. Unit is lightweight, polyglot, and dynamically configured via API.
Tags nginx programming iot devops miscellaneous nodejs javascript infosec
-
PHP encryption methods for passwords and other sensitive data
Posted on October 7, 2018, Level intermediate Resource Length long
Ashley Rich published this article about various methods of protecting sensitive data in PHP. There is a range of different encryption methods in use today, the most common being hashing, secret key encryption and public key encryption. Also in PHP 7.2+ you have cryptography extension Sodium which should simplify vastly complicated cryptography landscape.
Tags php infosec crypto
-
Encrypting vs. signing with OpenPGP. What's the difference?
Posted on October 2, 2018, Level beginner Resource Length medium
Brad Wyro thoughts on encryption versus signing with OpenPGP. OpenPGP is the most widely used email encryption standard. PGP stands for Pretty Good Privacy. In the article author helps to answer following question: how can you ensure confidential data transmitted via email is kept private?
Tags infosec crypto messaging
-
An overview of privacy in cryptocurrencies
Posted on August 16, 2018, Level beginner Resource Length long
Blog post by Richard Chen about privacy consideration when dealing with cryptocurrencies. It's no secret that privacy is an important topic in cryptocurrencies these days. Neither companies nor individuals want to publish all of their information onto a public blockchain that can be arbitrarily read without any restrictions.
Tags fintech blockchain infosec
-
Angular security -- Authentication with JSON Web Tokens (JWT), complete guide
Posted on May 26, 2018, Level intermediate Resource Length long
Angular university brought you this a step-by-step guide for both designing and implementing JWT-based Authentication in an Angular application. The goal here is to discuss JWT-based Authentication Design and Implementation in general.
Tags nodejs javascript angular infosec apis
-
Fact vs. fiction: 6 myths about container security
Posted on May 21, 2018, Level beginner Resource Length medium
David Lawrence wrote this article to help you to quell these myths so you can find default security and secure coding at the heart of well-architected containers. In this article, authors take a look specifically at the myths surrounding container security -- and the opportunities container technology presents to integrate security at each stage of the application lifecycle that otherwise would be hard to achieve.
Tags programming containers infosec devops
-
How to securely store API keys
Posted on March 7, 2018, Level intermediate Resource Length long
Bruno Pedro detailed blog post focusing on secure storage of your API keys in the cloud. Many people store sensitive information in private git repositories. If you do this, please think about it twice.
Tags infosec apis restful
-
Why cryptography is much harder than software engineers think
Posted on February 11, 2018, Level advanced Resource Length medium
Andrew Mayo, senior system architect at 1E, wrote this intriguing article about ROCA vulnerability and how it raises some important issues about the design of secure cryptographic software. The vulnerability is not in this case an obvious coding error such as a buffer overflow, or the use of a poor quality random number generator.
Tags programming infosec devops