Joseph Rochefort, born OTD in 1900, was a major figure in the US Navy's cryptographic and intelligence operations from 1925 to 1946, particularly in the Battle of Midway https://cromwell-intl.com/travel/japan/wwii-cryptanalysis/?s=mb #cybersecurity #cryptography #history
In a Muskian Cybercoup, Mr. Big Balls parades into your server room, and copies all of your data. It is the ultimate (quasi-)insider threat.
What can you do to protect yourself against such an adversary? You can collect less data, especially focused on reducing the collection of the most sensitive bits of data.
You can have in place retention policies that involve deleting most of the data that you do collect after a period of time.
And you can salt your password hashes with self-documenting plaintext tags, so that anybody who knows how to crack your passwords must know how to contact your organization:
Monday news from ITSPmagazine #happymonday!
Join Marc Manzano, Sean Martin, CISSP and me on this week SandboxAQ Webinar!
After an incredible conversation with Marc on the #RSAC floor in San Francisco — where Sean and I used every second of our time and still had more to explore — I knew the #Sandbox Story couldn’t stop there.
If you missed that on-location episode from #RSAC2025, catch it here:
Security at the Edge of Change – A Brand Story with Marc Manzano from SandboxAQ
Now, we’re keeping the momentum going with a live ITSPmagazine webinar you don’t want to miss — and I won’t either.
How To Detect And Mitigate Non-Human Identity And Cryptographic Vulnerabilities | An ITSPmagazine Webinar with SandboxAQ
Join Marc, Sean, and me as we dig deeper into how SandboxAQ is tackling one of today’s most urgent security challenges.
Unmanaged cryptographic assets and non-human identities have left security teams blind to critical risks. These gaps have fueled vulnerabilities, breaches, compliance challenges, and operational drag across enterprise environments.
By attending, you’ll:
Gain visibility into cryptographic assets and non-human identities like API keys, certificates, and service accounts
See how #AQtiveGuard enables automated discovery, threat detection, and root cause analysis without disrupting workflows
Learn how to future-proof your security with Post-Quantum Cryptography readiness and AI-powered #SecOps
Learn more:
REGISTER NOW:
Can’t attend the live webinar? All registrants get exclusive access with a link to rewatch the recording.
Share the news and join us!
See you live on Thursday!
Cryptohack. Решение Oh SNAP. Атака Флюрера-Мантина-Шамира (Fluhrer, Mantin, Shamir)
Приветствую, Хабр! В нескольких предыдущих статьях я рассматривал различные режимы шифрования для блочных шифров, постепенно сдвигаясь в сторону режимов, превращающих блочные шифры в потоковые. В новой статье в фокусе будет чисто потоковый шифр - RC4. Я расскажу о самом шифре, а также об атаке FMS и применении её для решения задачи Oh, SNAP с платформы Cryptohack.
Today is Joseph Rochefort's birthday! #Cryptography has its own language https://cromwell-intl.com/cybersecurity/crypto/terminology.html?s=mb #cybersecurity
Our paper
"Agile, post-quantum secure cryptography in avionics"
was just released in open access! :D
Today is Joseph Rochefort's birthday! Time to learn about #cryptography https://cromwell-intl.com/cybersecurity/crypto/?s=mb #cybersecurity
I think one of the biggest problems of #society is that we're assuming (and I believe this is a reflection of #christianity) that there can only be ONE source of truth. And truth tables in order to be true or false, needs two other things to validate the truth. If one #ai says a thing, and another says a completely different thing, overlaid which thing is true? Well, there's always going to be _some_ truth in everything, and those are the markers of truths. I think #cryptography is good for that
JavaScript and Cryptography: Handling Cryptography in the Browser https://chat-to.dev/post?id=VWxZbVB5SFJSM3ROY0RCVFdmOTc5dz09 #cryptography #javascript #programming #coding #hacking
LoopMix128 – Fast C PRNG (.46ns), 2^128 Period, BigCrush/PractRand Pass
The German submarine U-110 was captured by the Royal Navy OTD in 1941, it was carrying the latest Enigma machine which Allied cryptographers later used to break encrypted German messages https://cromwell-intl.com/travel/uk/bletchley-park/?s=mb #travel #cryptography #history
I spent some time today working on the (incomplete) design document for the Global Password Prehash Protocol, version 2. Not a lot in terms of new material, but I did reorganize things and am much happier with the overall flow at this point in time.
CISSP: The Last Mile: Your guide to the finish line https://leanpub.com/cissplastmile by Pete Zerger is the featured book on the Leanpub homepage! https://leanpub.com #ComputerSecurity #CloudComputing #Cryptography #books #ebooks
The book covers every topic in the latest CISSP exam syllabus, organized in a format that makes it easy to drill down on specific exam domains and concepts at-a-glance.
Find it on Leanpub!
Last week four new #chatmail relays popped up from four different continents from four different entities.
Permission-free interoperability based on #cryptography ... That's how we like it and how it generally is with the email system: separation of transport and apps. App developers can't access messages, and relay operators can not break e2ee encryption. Fwiw May 14th there is another round at a #Moscow court where our lawyers will convey this impossibility for #deltachat to hand over data.
Today is Ron Rivest's birthday! #Cryptography has its own language https://cromwell-intl.com/cybersecurity/crypto/terminology.html?s=mb #cybersecurity