Articles

Password Overboard!  

Passwords are becoming a thing of the past. We look into the basic weaknesses of passwords, explain what passkeys are all about, and assess their practicality.

No Entry  

Check your web servers for known vulnerabilities.

Inspired  

SPIFFE and SPIRE put strong workload identities at the center of a zero-trust architecture. They improve reliability and security by taking the responsibility for identity creation and management away from individual services and workloads.

Martial Arts  

Binary analysis is an advanced technique used to work through cyberattacks and malware infestations and is also known as reverse engineering. We show you how to statically analyze binary programs with Binary Ninja, an interactive binary analysis platform.

New Gold  

Protecting data becomes increasingly important as the quantity and value of information grows. We describe the basics of data security and governance and how they intertwine.

Pulling the Plug  

The SHA-1 cryptographic hash function has been considered insecure for a long time. Some Linux distributions have banned or no longer use it – with some consequences, though.

Checkup  

Automated acceptance testing is a powerful tool for catching problems related to misconfiguration. We'll show you how to implement your own acceptance testing environment with a free tool called goss.

Strength in Numbers  

Threats can be detected and averted at an early stage with crowd security, in which organizations form a community to take concentrated action against cyberattacks by sharing attack data. We explain how this strategy works with the CrowdSec cloud service.

Unboxing  

Chocolatey and WinGet offer full-fledged package management on Windows, but which is best for your environment?

Keep It Simple  

Age and Rage are the Go and Rust implementations of a simple, modern, and secure file encryption tool.