Real-life Public Key Encryption (And Why It Matters)
One major topic in Learning Tree Course 468 System and Network Security Introduction is that of encryption. It is a core technology in cyber security because it is used to secure confidential data, as well as protect passwords and the integrity of documents. There are two basic families of encryption used to ensure the confidentiality […]
Another Breach of Data Stored In The Cloud. Please stop.
I have a love-hate relationship with ”the cloud”. I love how easy it is to create services, easily access software and data, and I love the easy sharing of data. But I seriously hate how easy it is to unintentionally expose data that should remain confidential. In April of this year, the Telegraph reported on […]
Fraudsters Use Padlocks, Too: More on Certificate Use and Abuse
A couple of months I wrote here about HTTPS and website security from a user standpoint. I need to add to that because bad guys can also use the digital certificates that make browsers show green padlocks or avoid notices about unencrypted sites. The issue here is that the certificate that lets a site use […]