Amit Paunikaramitpaunikar.hashnode.dev·Jun 17, 2024Digging deeper into FIPS and FedRAMP CompliancesIn an earlier article, we listed some of the Compliance and Regulatory standards required by Public Sector companies in the U.S. Here we dig deeper into two of these regulations - FIPS and FedRAMP. Federal Information Processing Standards (FIPS) FIPS...Discuss·27 readsCompliances
SHORT ZILLAsallbro.hashnode.dev·Jun 3, 2024NIST Defination of cloud computing with DiagramDefination: The National Institute of Standards and Technology (NIST) defines cloud computing as a model for enabling convenient, ondemand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applicat...DiscussNIST
SUDHIR PATELsudhircyber.hashnode.dev·May 23, 2024Effective Incident Response with the NIST Cybersecurity FrameworkReview the scenario below: You are a cybersecurity analyst working for a multimedia company that offers web design services, graphic design, and social media marketing solutions to small businesses. Your organization recently experienced a DDoS att...DiscussCYBERSECURITY ANALYTIC REPORTincident report in cybersecurity
Mblog.mm29942.com·Jan 30, 2024Exploring the Post-Quantum Cryptography Part 1Exploring KEMs like: Kyber1024, Firesaber, and Classic McEliece Introduction: Welcome to the inaugural segment of our new series. In this journey towards developing a high-level encryption library using Rust, we focus on post-quantum encryption and t...Discuss·10 likesExploring the Post-Quantum Cryptographykey-encapsulation-mechanism
Jennifer Mbaegbujencloud.ca·Jun 12, 2023Building Cyber-Resilience: 6 Approaches with NIST CSFThe NIST CSF (National Institute of Standards and Technology Cybersecurity Framework) is a widely recognized and adopted framework that provides a structured approach to managing cybersecurity risks. From studying the NIST CSF, I observed that most o...Discuss·87 readsNIST
Tiexin GuoforGitGuardiangitguardian.hashnode.dev·May 26, 2023Supply Chain Security: Secrets and Modern Security Frameworks (Part III)In the first part of this series, we dived into the SLSA framework to understand where supply chain security is headed; in the second part, we did a tutorial on sigstore/cosign about signing and verifying the integrity and origin of software artifact...DiscussDevops
Ganesh Jcodemuscle.hashnode.dev·Apr 25, 2023Locked and Loaded: The Importance of App Authentication in Today's Digital WorldAuthentication: Authentication can be very discouraging to build as a developer keeping various security features in mind. It is ideal to use or build authentication systems that don’t depend on 3rd party providers at all. Custom-building authenticat...Discuss·1 like·37 readsauthentication
Zach Wingowingo.hashnode.dev·Dec 5, 2021The Detect Function of the NIST Cybersecurity FrameworkIn our ongoing series on the NIST Cybersecurity Framework, we have previously covered the identify and protect functions. In this article, we will delve deeper into the detect function, which is an essential component of any comprehensive cybersecuri...Discuss·26 readsNIST
Asma Imthiyassecurus.hashnode.dev·Jul 25, 2022Selecting Security ControlsSo, We all would have read a lot about policies, procedures, frameworks, security controls, and much more in Cybersecurity, but that's not how actually we will be using it. Everything will be bits and pieces if you don't actually know how to implemen...DiscussNIST
Adam Chemironadamchemiron.hashnode.dev·Jul 9, 2022Developing an Incident Response Plan for your Organization"Every incident starts as an event, but not all events become incidents" The gravity of that statement rings true to any incident response team that has had to deal with numerous events that, on the surface, seem to be an incident but turn out to be ...Discuss·91 readsincident response