Emin MuhammadiforArticles by Emin Muhammadiarticles.eminmuhammadi.com·Oct 28, 2024Kyber KEM: A Quantum-Resistant Lattice-Based Framework for Secure Key Encapsulation (Example in Golang)Cryptography, the science of secure communication, has evolved to address new challenges in a world where traditional encryption techniques may fall short against quantum computers. Quantum computers, capable of processing vast amounts of information...DiscussCryptographykyber
Shruti RajeshforZySec AIblog.zysec.ai·Oct 17, 2024AI Liability in the U.S.: The Great Debate of 2024—Who's Holding the Robotic Bag?Ladies and gentlemen, welcome to the latest episode of "Who's Responsible for That Robot?" Live from the U.S., it's all about who's liable when AI decides to go rogue—or at least forgets to use a coaster. Let's delve into the policy debates turning h...DiscussAI Regulationsnews
Shruti RajeshforZySec AIblog.zysec.ai·Oct 15, 2024AI and Quantum Computing: The Next Challenge for CybersecurityImagine, if you will, a world where your computer is so powerful, it can solve the mysteries of the universe faster than you can decide what to order for dinner. Welcome to the realm of quantum computing, where the laws of physics themselves seem to ...Discusswef
Tanishka Marrottcloud-design-diaries.hashnode.dev·Oct 3, 2024How to Build a Golden Image Hardening Pipeline in AWSOptimize security while automating image creation with AWS tools. In AWS, golden image hardening is a crucial step for standardizing environments, enforcing security and ensuring compliance. But creating and maintaining these images manually is time...Discuss·5 likesAWS
Amit Paunikaramitpaunikar.hashnode.dev·Jun 17, 2024Digging deeper into FIPS and FedRAMP CompliancesIn an earlier article, we listed some of the Compliance and Regulatory standards required by Public Sector companies in the U.S. Here we dig deeper into two of these regulations - FIPS and FedRAMP. Federal Information Processing Standards (FIPS) FIPS...Discuss·27 readsCompliances
SHORT ZILLAsallbro.hashnode.dev·Jun 3, 2024NIST Defination of cloud computing with DiagramDefination: The National Institute of Standards and Technology (NIST) defines cloud computing as a model for enabling convenient, ondemand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applicat...DiscussNIST
SUDHIR PATELsudhircyber.hashnode.dev·May 23, 2024Effective Incident Response with the NIST Cybersecurity FrameworkReview the scenario below: You are a cybersecurity analyst working for a multimedia company that offers web design services, graphic design, and social media marketing solutions to small businesses. Your organization recently experienced a DDoS att...DiscussCYBERSECURITY ANALYTIC REPORTincident report in cybersecurity
Chitraksh Guptacodewizard.hashnode.dev·Feb 29, 2024Why AES Completely Took Over DES: A Crisp OverviewIn the world of cryptography, the transition from the Data Encryption Standard (DES) to the Advanced Encryption Standard (AES) marks a significant leap in data security. While both algorithms have played crucial roles in protecting sensitive informat...DiscussCryptography
Mblog.mm29942.com·Jan 30, 2024Exploring the Post-Quantum Cryptography Part 1Exploring KEMs like: Kyber1024, Firesaber, and Classic McEliece Introduction: Welcome to the inaugural segment of our new series. In this journey towards developing a high-level encryption library using Rust, we focus on post-quantum encryption and t...Discuss·10 likes·27 readsExploring the Post-Quantum Cryptographykey-encapsulation-mechanism
Jennifer Mbaegbujencloud.ca·Jun 12, 2023Building Cyber-Resilience: 6 Approaches with NIST CSFThe NIST CSF (National Institute of Standards and Technology Cybersecurity Framework) is a widely recognized and adopted framework that provides a structured approach to managing cybersecurity risks. From studying the NIST CSF, I observed that most o...Discuss·58 readsNIST