Saquib KhanSSL Certificates: A Common Interview Question and How to Answer ItSecure Sockets Layer (SSL) certificates are pivotal in ensuring the security of data transmitted across the internet. By encrypting…Dec 27, 20243Dec 27, 20243
Andrew ZuoMozilla? Dead. Apple? Crippled. Google’s Antitrust Case Is Going To Shake Things UpGoogle has been charged with violating section 2 of the Sherman Act by a US Judge which means (in the opinion of the judge) a few things:Aug 6, 20248Aug 6, 20248
Moshe Binieli (משה ביניאלי)Secure Your Web Applications with OAuth2: A Developer’s GuideSecuring Web Applications with OAuth2: Theoretical Overview and Practical Guide with Gifs, Images and Code Example using Google Drive APIAug 6, 2024Aug 6, 2024
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEApproximating Functions Using Polynomials: Chebyshev Approximation in Homomorphic EncryptionLike it or not, we are moving to a foundation of cybersecurity which moves us away from our traditional public key methods into a world…Aug 4, 2024Aug 4, 2024
Tamir SulimanComparing Popular SIEM Data Pipeline Designs: Elastic , ArcSight, QRadar, and Splunk — Part 2We will continue with what we discussed on Part 1. In this article we will provide detailed analysis of the pipeline designs of f…Aug 3, 2024Aug 3, 2024
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEHow Can We Determine If Bob Is Older Than Alice, Without Revealing Their Ages?The millionaire’s problem has been known for decades, and when two millionaires meet and want to know who has the most money but don’t want…Jul 30, 20247Jul 30, 20247
InDev Learning DailybyFahim ul HaqThe CrowdStrike crash lesson every dev should rememberWhat a small, yet devastating bug can teach us about effective software developmentAug 1, 2024Aug 1, 2024
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEThe Next Great Thing(s) In Cybersecurity: Post Quantum Cryptography and Homomorphic Encryption[After a day of compiling C++ code into a useable library, and then getting it integrate with Microsoft Code, here’s a code example]Jul 27, 2024Jul 27, 2024
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSELet’s Talk About Testing and C/C++: Was The CrowdStrike Bug A Pointer Problem?Jul 21, 202414Jul 21, 202414
Tom Smykowski😟 Security Experts Terrified By SSH Vulnerability. Here’s What We KnowApr 3, 202429Apr 3, 202429
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEA Decade With My Head in the CloudsFrom Flash and .NET to CryptographyMar 31, 2024Mar 31, 2024
InExperience StackbyJINMastering Aspect-Oriented Programming (AOP): Simplifying Complex CodebasesLearn how AOP enhances maintainability and flexibility in software development while overcoming traditional OOP limitations.Feb 9, 2024Feb 9, 2024
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEJWT With RSA SigningI’ve lost count of the number of times I’ve advised companies to stop using HMAC in signing of JWT tokens. Why? Because they often just use…Feb 4, 2024Feb 4, 2024
Netflix Technology BlogEmbracing Neurodiversity Within Information SecuritySecurity’s unique cultural and complexity challenges benefit from neurodiverse perspectives.Feb 5, 202411Feb 5, 202411
Prof Bill Buchanan OBE FRSEHiding Encryption and Credit Card Numbers In Plaintext With Format Preserving EncryptionWe can normally spot when something is encrypted, as it either looks like Base64 or hex characters. But, why can’t we convert our…Nov 12, 20233Nov 12, 20233
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEDigital Forensics Has Lost a Key Tool: Goodbye, Google CacheAn often-told tale of a digital forensics investigation is where a target website has revealed key elements of information that a timeline…Feb 4, 2024Feb 4, 2024
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEPrivacy-Preserving SQL Queries Using Order Preserving EncryptionWe live in a 20th-century world of data, where data processing and storage are often done with little trust and little privacy…Jan 27, 20241Jan 27, 20241
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEGoodbye to the 64-byte public keys of ECDH and Hello to 640KB public keys?Mceliece is more suited to public key encryption than key exchange?Jan 13, 20241Jan 13, 20241
InGitGuardianbyTiexin GuoThe New Frontier in Cybersecurity: Embracing Security as CodeSecurity as Code (SaC) is often used with DevSecOps, but what does it mean exactly? Learn best practices for a more secure dev process.Jan 29, 2024Jan 29, 2024