Cybersecurity Category
Covering all aspects of security, threats, and best practices.
05/18/2017
Troubling ISP Privacy Repeal: The Data Will be Breached
by Frank Rietta
With a green light from Congress & President Trump, your ISP may begin some really creepy business practices that endanger your family's privacy and security.
02/28/2017
Breach Prevention for Developers Talk at Kennesaw State University
by Frank Rietta
As an information security professional, it’s critical to know something about how custom web applications are developed and the impact that has on application security.
02/22/2017
Intro to App Sec Podcast Interview
by Frank Rietta
Frank was the guest on the August 29, 2016, Intro to App Sec Episode of the Advanced Persistent Security podcast. Listen here.
01/12/2017
The MongoDB hack and the importance of secure defaults
by Frank Rietta
If you have a MongoDB installation, now would be the time to verify that it is secure. Tim Kadlec has written a must read post.
05/10/2016
Bad Password Practices are Responsible For Most Data Breaches. You Can do Better.
by Frank Rietta
Verizon DBIR says 61% of data breaches are the result of bad password practices. Your app can avoid some of the pitfalls with a few precautions, especially using slow hashes and 2FA.
03/16/2016
It is not just one iPhone, the FBI wants a future where it is impractical to deploy strong encryption without key escrow
by Frank Rietta
The FBI wants a future where it is illegal or impractical to deploy strong encryption without key escrow, which is a key backup system that is insecure at scale. Data breach risks will increase as our devices become less secure.
02/05/2016
What is the difference between bcrypt and SHA256?
by Frank Rietta
TL;DR; SHA1, SHA256, and SHA512 are all *fast hashes* and are bad for passwords. BCRYPT is a *slow hash* and is good for passwords. Always use slow hashes, never fast hashes.