Tag: cyber security

  • OSS Security Tool Highlight: Sigstore Cosign

    Sigstore Cosign is an open-source tool for securely storing and sharing cryptographic signatures. It is designed to help organizations and individuals verify the authenticity and integrity of digital documents and other types of files, using cryptographic signatures and public key infrastructure (PKI). https://github.com/sigstore/cosign Cryptographic signatures are a way of using cryptography to verify the authenticity […]

  • Summary of Lyft Security’s Open-Source Cartography

    Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powered by a Neo4j database. https://github.com/lyft/cartography The main goal of Cartography is to provide a high-level overview of a software system, highlighting key components, dependencies, and connections. It does this by parsing various types of data sources, such […]

  • Security Architecture Katas

    Software security architecture katas are a set of exercises or challenges that help developers and security professionals build and maintain secure software systems. These katas can be used to improve knowledge and skills in key areas such as secure design and development, risk management, and threat modeling. One of the key benefits of software security […]

  • What is Security Chaos Engineering

    Security chaos engineering is a subfield of chaos engineering that specifically focuses on testing and improving the security of a system. It involves deliberately introducing security-related failures or disruptions into a system in order to test its resilience and ability to recover from those failures or disruptions. Like traditional chaos engineering, security chaos engineering involves […]

  • CYBER SECURITY VS. SAFETY

    Computer safety and cyber security are two closely related concepts that are often used interchangeably, but they do have some distinct differences. Computer safety refers to the measures taken to protect a computer system and its users from harm or damage. This includes protecting against physical threats, such as fire, water, and electrical surges, as […]