Your Security Perimeter is a Living Cell, Not a Castle Wall

Editor's Note: This post was originally posted on Cobalt's blog. Check out the original post here. Check out their site if you are interested in a new way to pen test your application. You've heard the analogy before. Your enterprise is a fortress. Protect it with towers. Build stone walls to protect your data. Build …

Continue reading Your Security Perimeter is a Living Cell, Not a Castle Wall

Advertisements

The Developer’s Guide to Cryptography: Hash Functions and HMACs

So far, we've discussed the basics of encryption and symmetric encryption algorithms. Encryption is used to protect the confidentiality of data. Let's now take a small turn and look at protecting the integrity and authenticity of data. Encryption can protect data from being read while in transit. However, this does not prevent the data from …

Continue reading The Developer’s Guide to Cryptography: Hash Functions and HMACs

Guest Post on Simple Programmer: History of Women in Software Engineering

It's a little late, but I wanted to make sure I have a link to my latest Simple Programmer guest post. The post explores some of the women that have made major contributions to the world of software engineering from the beginning of computers to today. Check it out! https://simpleprogrammer.com/2017/09/18/female-software-engineers/

The Developer’s Guide to Cryptography: Why ASP.NET Core 2 Gets It Right

Last time, we discussed what AES encryption looks like in Node.js. Now, to get a flavor of what other languages and frameworks do for AES encryption, we'll take a look at ASP.NET Core 2. I am excited with what ASP.NET Core and .NET Core in general do for C# and other Microsoft technologies. ASP.NET Core …

Continue reading The Developer’s Guide to Cryptography: Why ASP.NET Core 2 Gets It Right

The Developer’s Guide to Cryptography: AES in Node.js

The Advanced Encryption Standard, or AES, is the standard chosen by the U.S. government to protect messages with symmetric encryption. Understanding what AES does and how it works is important. So is understanding how to use is practically in a real program. We'll first take a look at the Node.js implementation of AES. For now, …

Continue reading The Developer’s Guide to Cryptography: AES in Node.js

The Developer’s Guide to Cryptography: Symmetric Encryption

So we already discussed the basics of cryptography. Now let’s take a look at the first family of major cryptographic algorithms, symmetric encryption algorithms. First, we’ll take a look at what the term “symmetric encryption” actually means. What is Symmetric Encryption? The term symmetric means “made up of exactly similar parts”. This hints at the …

Continue reading The Developer’s Guide to Cryptography: Symmetric Encryption

The Developer’s Guide to Cryptography: The Basics

It is rare that a developer will finish his or her career without seeing, hearing about, or using cryptography. In today’s connected world, some form of cryptography is almost certainly a requirement for most applications. While you may need to use cryptography, how much do you actually understand it? If someone tells you that they …

Continue reading The Developer’s Guide to Cryptography: The Basics