Since 1999

Cybersecurity Category

Covering all aspects of security, threats, and best practices.

02/05/2016

What is the difference between bcrypt and SHA256?

TL;DR; SHA1, SHA256, and SHA512 are all *fast hashes* and are bad for passwords. BCRYPT is a *slow hash* and is good for passwords. Always use slow hashes, never fast hashes.

Read More ยป

10/15/2015

Ruby Application Security Talk Featured in Ruby Weekly Issue # 268

Read More ยป

09/28/2015

What is Application Security?

Read More ยป

05/04/2015

Uniqueness Validation Race Condition in Ruby on Rails applications

It's easy for race conditions to slip into your code and out into production. 'validates :field_name, uniqueness: true' is not enough to prevent duplicates in your database; here's how to enforce data integrity with both validations and unique indexes.

Read More ยป

02/19/2015

New Video! Understanding & Defending Against Data Breaches

Security incidents that lead to customer data breaches, which have been happening at an increasing rate. Most of these incidents are preventable, some would have even been stopped by simply having two factor authentication for staff member access.

Read More ยป

01/09/2015

Two new videos! How a Ruby on Rails developer can help prevent a Data Breach

Videos of the data breaches and Ruby on Rails are now up on YouTube! Level up on your security knowledge because good software security needs to be a moral stance!

Read More ยป

10/16/2014

How To Protect Against the POODLE SSLv3 Vulnerability

Read More ยป

10/13/2014

Commercial Information Security Classification System

Read More ยป

10/07/2014

Government vs Security - Schneier explains

Read More ยป

10/02/2014

Raspberry Pi crypto key management project!

A dedicated offline crypto key management system OpenPGP and an SSL Certificate Authority set up for air-gapped operations using a Raspberry Pi B.

Read More ยป