Close

(85) Information security, Bilgi güvenliği

Information security, often referred to as infosec, is the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction to ensure its confidentiality, integrity, and availability.

SHA-1 has broken in practice

We have broken SHA-1 in practice.

We have broken SHA-1 in practice. This industry cryptographic hash function standard is used for digital signatures and file integrity verification and protects a wide spectrum of digital assets, including credit card transactions, electronic documents, open-source software repositories, and software updates. It is now practically possible to craft two colliding […]

Devamını Oku

Navigating the World of AWS Cloud Databases

AWS Cloud Databases

Modernize your data infrastructure with fully managed, purpose-built databases Choose the right purpose-built engine. Use case-driven, highly scalable, distributed applications suited to your specific needs. AWS offers 15+ purpose-built engines to support diverse data models, including relational, key-value, document, in-memory, graph, time series, wide column, and ledger databases. Achieve performance […]

Devamını Oku

What is SHA? What is SHA used for?

cryptography

SHA stands for secure hashing algorithm. SHA is a modified version of MD5 and is used for hashing data and certificates. A hashing algorithm shortens the input data into a more diminutive form that cannot be understood using bitwise operations, modular additions, and compression functions. You may be wondering, can […]

Devamını Oku

A digital right to the city: who defines democracy in smart cities?

A digital right to the city: who defines democracy in smart cities?

Digitization of the city is heralded as the bottom-up empowerment of its citizens. But who defines citizenship as digital technology infiltrating everything from personalized experience to the unimagined potential of networked urban space? Mark Dean unpacks recent academic literature that questions citizens’ rights in the hyper-connected city.  Improving the smart city for […]

Devamını Oku

What Is OpenSSL?

What Is OpenSSL?

OpenSSL is a software library that provides cryptographic functionality, including secure communications over computer networks. It is widely used to implement the secure sockets layer (SSL) and transport layer security (TLS) protocols, which are used to establish secure connections between networked computers. OpenSSL is used in many software applications and […]

Devamını Oku

Domino’s Pizza’da bilgi sızıntısı

Domino's Pizza

Dominos Pizza’nın Kişisel Verileri Koruma Kuruluna ilettiğine göre, 3 müşteri ve 1 eski çalışanı verileri ele geçirildi. Veriler arasında müşterilerin doğum yılı, ad, soyad, cep numarası ve e-posta adresi yer alıyor. Kişisel Verileri Koruma Kurumu’nun yayınladığı bir duyuruya göre Domino’s Pizza’da yaşanan KVKK ihlali 180 bin kişiyi etkiledi.  Kamuoyu Duyurusu (Veri İhlali […]

Devamını Oku

Streaming Made Simple: Unleashing the Power of AWS Kinesis Firehose for Real-time Data Processing

Streaming Made Simple: Unleashing the Power of AWS Kinesis Firehose for Real-time Data Processing

AWS Kinesis Amazon Kinesis is a fully managed service that Amazon Web Services (AWS) provides for real-time processing and analyzing streaming data. It enables you to collect, process, and analyze large volumes of streaming data in real-time from various sources such as social media, logs, IoT devices, and clickstreams. Amazon […]

Devamını Oku

Get File Storage That Scales: A Beginner’s Guide to AWS Elastic File System (EFS) for Your Cloud-Based Applications

Get File Storage That Scales: A Beginner's Guide to AWS Elastic File System (EFS) for Your Cloud-Based Applications

AWS Elastic File System (EFS) is a fully managed, scalable, and highly available file storage service that Amazon Web Services (AWS) provides. EFS allows you to create and manage file systems that can be accessed by multiple Amazon Elastic Compute Cloud (EC2) instances simultaneously, providing shared file storage for your […]

Devamını Oku

Is AWS Shield the Only Way to Secure Your AWS Environment? Exploring Competitors and Alternatives

Is AWS Shield the Only Way to Secure Your AWS Environment? Exploring Competitors and Alternatives

When it comes to securing your AWS environment, there are several options available to you. One such option is AWS Shield, a managed Distributed Denial of Service (DDoS) protection service offered by Amazon Web Services (AWS). We will explore what AWS Shield is, why it is used, and the competitors […]

Devamını Oku

Is Amazon GuardDuty the Best Way to Protect Your AWS Environment?

Is Amazon GuardDuty Really the Best Way to Protect Your AWS Environment?

Amazon GuardDuty is a threat detection service offered by Amazon Web Services (AWS) that continuously monitors your AWS accounts and workloads for malicious or unauthorized activity. GuardDuty is a managed service that analyzes billions of events across multiple AWS data sources, including VPC flow logs, CloudTrail logs, and DNS logs, […]

Devamını Oku