The CCSP Cloud Security Certification is Hot, How Can I Prepare?
The (ISC)2 CCSP is hot. That’s the Certified Cloud Security Professional. It’s from the same group that offers the famous CISSP. At the end of 2018 there were 131,180 people with CISSP world-wide, and 84,557 in the U.S.A. But, only 4,518 people world-wide held CCSP. Do you want to be one of the new ones? Not What […]
A Cyber Security Income Opportunity: Freelance Bug Finder
I recently wrote about the Cyber Security Staffing Shortage, and how it meant good things for those interested in careers in cyber security. Here is another – potentially quite lucrative – opportunity: bounty hunter. I’m not talking about the bounty hunters you see in movies or television shows, though. I’m talking about bug finders. You […]
What Is Web Metadata Encryption and Why Is It Important?
Your data may be encrypted when you use https, but what about your metadata? I wrote about metadata and eavesdropping earlier this year – it is, among other things, the URLs of the websites you visit. If attackers can access this information, they can learn some potentially confidential information about you, and you are unlikely […]
WebAuthn: Toward the End of Passwords On the Web
Frequent readers of this blog will know that I am constantly looking for alternatives to passwords. Some reasons are: they can be shared so a system cannot tell who the real user is, they can be forgotten, when stored improperly they can be leaked. Passwords fall into the single-factor category of “something you know” (the […]
How Are Fiber Optic Cables Used For (Physical) Intrusion Detection?
Many of us have fiber optic cable that delivers Internet access to our homes or offices. But optical fiber cable can be used for more than high-speed data transfer. I’m not talking about artwork or illumination, but rather an important security application: physical intrusion detection. Optical fiber types In order to understand how this works, […]