Close

Encryption/Decryption

Encryption is the process of converting data into a form that is unreadable by unauthorized parties. This is done by using a mathematical algorithm to scramble the data, and then using a key to unscramble it. The key is a piece of information that is known only to the sender and receiver of the encrypted data.

Decryption is the process of converting encrypted data back into its original form. This is done by using the same mathematical algorithm and key that were used to encrypt the data.

Beyond the Walls: AWS GuardDuty’s Watchful Eye on Your Cloud.

Beyond the Walls: AWS GuardDuty's Watchful Eye on Your Cloud.

AWS GuardDuty is a cloud-based threat detection service that monitors your AWS accounts and workloads for malicious or unauthorized activity. You can use AWS GuardDuty to detect and respond to threats such as compromised instances, reconnaissance, port scanning, denial of service attacks, and more. AWS GuardDuty can also integrate with […]

Devamını Oku

Fortifying MQTT Infrastructure: A Five-Pronged Approach

Fortifying MQTT Infrastructure: A Five-Pronged Approach

The article from IoT For All, authored by EMQ Technologies Inc., presents a comprehensive overview of strategies to enhance the security of MQTT infrastructure systems. Here are the key strategies outlined: Building a culture of security awareness through employee training, security policies, and regular drills is also emphasized as a […]

Devamını Oku

OpenSSL 3.2 Beta Debuts with Client-Side QUIC and Enhanced Compression Algorithms

OpenSSL 3.2 Beta Debuts with Client-Side QUIC and Enhanced Compression Algorithms

OpenSSL, the open-source cryptographic library, has released its 3.2 version in beta, introducing several new features and improvements. This update brings initial client-side support for QUIC, a transport layer network protocol developed by Google and adopted by the IETF. Future versions, OpenSSL 3.3 and 3.4, are set to refine this […]

Devamını Oku

Middleware and Message Broker Basics

IOT

Fundamentals of Middleware and Message Broker Middleware is software that connects different applications and systems. It provides a common platform for applications to communicate with each other, regardless of their underlying platform or programming language. Middleware can be used to solve a variety of problems, including: Message brokers are a […]

Devamını Oku

Security in DevOps and AWS with AWS IAM

Security in DevOps and AWS with AWS IAM

Keep your systems and data secure. DevOps is a set of practices that combines software development (Dev) and IT operations (Ops). DevOps aims to shorten the systems development life cycle and provide continuous delivery with high quality. Security is an integral part of DevOps. By following security best practices, you […]

Devamını Oku

Mathematician Alleges US Spies Could Be Weakening Next-Gen Encryption

Mathematician Alleges US Spies Could Be Weakening Next-Gen Encryption

Quantum computers, which are anticipated to be soon able to crack current encryption methods, have led to plans for developing new, secure algorithms. However, there are concerns that the US National Security Agency (NSA) might undermine this process. A leading cryptography expert, Daniel Bernstein, from the University of Illinois Chicago, […]

Devamını Oku

Welcome to authentik

authentik

authentik is a unified platform designed to bring all authentication needs into one place. It aims to replace platforms like Active Directory, Okta, and Auth0. The platform offers a range of features: The platform also compares with other providers like Keycloak, Microsoft ADFS, Microsoft Azure AD, Okta, Duo, and Authelia, […]

Devamını Oku

RSA Key Generation, Signatures, and Encryption using OpenSSL

OpenSSL

Demonstration of using OpenSSL to create RSA public/private key pair, sign and encrypt messages using those keys, and then decrypt and verify the received messages. Commands used: OpenSSL. Created by Steven Gordon on 7 March 2012 at Sirindhorn International Institute of Technology, Thammasat University, Thailand. Using the RSA algorithm, RSA […]

Devamını Oku

OpenSSL 1.1.1 Reaches End of Life, But Extended Support Available for a Price

OpenSSL 1.1.1 Reaches End of Life But Extended Support Available for a Price

OpenSSL 1.1.1, launched in 2018 as a Long Term Support (LTS) version of the open-source secure communication library, has reached its end of life. This means users must transition to a newer version unless they are willing to pay for extended support. For those not prepared to shift to the […]

Devamını Oku

The change in OpenSSL’s licensing

The change in OpenSSL's licensing

The change in OpenSSL’s licensing to the Apache License v2 (often referred to as ALv2) has several implications for businesses and developers. Here’s a breakdown: Permissive Licensing: The Apache License v2 is a permissive open-source license. This means that the software can be freely used, modified, and distributed, even in […]

Devamını Oku