Keep Your Certificates Up To Date
Someone from a major aerospace manufacturer asked me for some cybersecurity assistance a few months ago. A security audit had resulted in a worrying but mystifying warning about SSL certificates. Their secure web site would cease functioning in just a few days. We fixed that, but similar deadlines are approaching over the next two years […]
New Year’s Resolution: How to Back Up Your Data
Last week I encouraged you to use Amazon’s cheap and extremely resilient Glacier service to archive your personal data. Let’s see how to do this. Glacier uses the same storage technology as S3, for just one-tenth the cost. The primary trade-off is that Glacier is intended for archiving data, not using it, and to get […]
Why an Upgrade to SHA-2 Needs to be Part of Your Cyber Security Strategy
Back in 2013 I introduced the concept of hashing to readers of this blog. We also discuss it in Learning Tree’s System and Network Security Introduction. One aspect of hashing I didn’t discuss much was hash algorithms. There have been many hash algorithms in popular use over the years including MD4 and Snefru, for many […]
Why a Bitcoin Bank?
I have to confess that I just don’t get Bitcoin and the other cryptocurrencies. I don’t mean the cryptographic part of it, I do understand how it works. And Silk Road and its replacements demonstrate the utility. But I don’t get why so many people use it the way they do. Cryptocurrency today seems to […]