Homepage
Open in app
Sign in
Get started
ASecuritySite
When Bob Met Alice
Follow
Software Cybersecurity Risks on Embedded Devices/IoT
Software Cybersecurity Risks on Embedded Devices/IoT
MITRE has applied its ATT&CK model to enterprise networks, mobile devices and critical infrastructure. However, one area is still weak in…
Prof Bill Buchanan OBE FRSE
Oct 6
WAFs Show That End-to-End TLS Encryption Tunnels Can Be Broken Into Two Tunnels
WAFs Show That End-to-End TLS Encryption Tunnels Can Be Broken Into Two Tunnels
But it needs the trust of a proxy in-between
Prof Bill Buchanan OBE FRSE
Oct 6
Fortuna
Fortuna
The usage of Pseudo Random Number Generators (PRNG) is fundamental in cybersecurity and is used to create keys and salt values for…
Prof Bill Buchanan OBE FRSE
Oct 5
It’s a Perfect 10!
It’s a Perfect 10!
I sometimes show this slide at the start of a presentation which introduces encryption:
Prof Bill Buchanan OBE FRSE
Oct 4
Humans v AI in Cybersecurity
Humans v AI in Cybersecurity
Or, Can Humans and AI Work Together in Cybersecurity?
Prof Bill Buchanan OBE FRSE
Sep 28
JavaScript Is A Trademark!
JavaScript Is A Trademark!
Please excuse me, but this article may be breaching trademarking rules. And, before I begin, I must state that JavaScript has very little…
Prof Bill Buchanan OBE FRSE
Sep 27
Salt Is Good in Cybersecurity, But Pepper Is Even Better
Salt Is Good in Cybersecurity, But Pepper Is Even Better
We need to admit that generally, we are not very good at storing user passwords, and there have been many breaches where hashed versions of…
Prof Bill Buchanan OBE FRSE
Sep 24
About ASecuritySite: When Bob Met Alice
Latest Stories
Archive
About Medium
Terms
Privacy
Teams