article thumbnail

Ross Anderson

Schneier on Security

Of course it was before 2008, when we created the Security and Human Behavior workshop. It was well before 2001, when we created the Workshop on Economics and Information Security. I know I was at the Fast Software Encryption workshop in December 1993, another conference he created. Okay, he created both—I helped.)

article thumbnail

Weekly Update 138

Troy Hunt

It's Minnesota this week and I've just wrapped up a couple of days of Hack Yourself First workshop followed by the opening keynote at NDC followed by PubConf. After a mammoth 30-hour door-to-door journey, I'm back in the USA! There's also a follow-up to the video I promised to include in this blog post.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat Model Thursday: Data Flow Diagrams

Adam Shostack

The clients want the same, but after it's crossed the boundary, by definition, that's a matter of trust (or encryption). 1st International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), In EEE/ACM 42nd International Conference on Software Engineering Workshops (ICSEW20), Seoul, South Korea, May 23-29, 2020.

article thumbnail

Two flaws could allow bypassing AMD SEV protection system

Security Affairs

The chipmaker AMD published guidance for two new attacks against its SEV ( Secure Encrypted Virtualization ) protection technology. The findings about the two attacks will be presented by two research teams at this year’s 15th IEEE Workshop on Offensive Technologies (WOOT’21).

article thumbnail

Threat Model Thursday: Data Flow Diagrams

Adam Shostack

The clients want the same, but after it’s crossed the boundary, by definition, that’s a matter of trust (or encryption). Perhaps it does – the server probably wants to keep client data segregated. So two takeaways for today: first, go read “ Are Data Flow Diagrams Enough?

article thumbnail

GUEST ESSAY: A primer on NIST 207A — guidance for adding ZTNA to cloud-native platforms

The Last Watchdog

The 4th Annual Multi-Cloud Conference and Workshop on ZTNA is an upcoming event for anyone interested in how the federal government is advancing standards in ZTNA. Encryption in transit provides eavesdropping protection and payload authenticity. We want encryption in transit so no one can read sensitive data from our network traffic.

article thumbnail

Ask a Security Pro: What Is Website Encryption?

SiteLock

Over the last year I’ve led a multitude of security workshops aimed to educate entry-level WordPress users about website security. Some of the questions I regularly field in these workshops are related to the mechanics of SSL certificates, and their role in protecting website data from prying eyes. HTTPS encrypts data in transit only.