-
Introducing s2n-quic, a new open-source QUIC protocol implementation in Rust
At Amazon Web Services (AWS), security, high performance, and strong encryption for everyone are top priorities for all our services. With these priorities in mind, less than a year after QUIC ratification in the Internet Engineering Task Force (IETF), we are introducing support for the QUIC protocol which can boost performance for web applications that…
-
Hardening the security of your AWS Elastic Beanstalk Application the Well-Architected way
April 7, 2022: This post has been updated with sample Elastic Beanstalk application with hardened security configurations on GitHub. Launching an application in AWS Elastic Beanstalk is straightforward. You define a name for your application, select the platform you want to run it on (for example, Ruby), and upload the source code. The default Elastic Beanstalk configuration…
-
How to use tokenization to improve data security and reduce audit scope
April 25, 2023: We’ve updated this blog post to include more security learning resources. Tokenization of sensitive data elements is a hot topic, but you may not know what to tokenize, or even how to determine if tokenization is right for your organization’s business needs. Industries subject to financial, data security, regulatory, or privacy compliance…
-
Ennoventure Secures $8.9M in Series A to Scale AI-Powered Brand Protection Technology
Ennoventure Secures $8.9M in Series A to Scale AI-Powered Brand Protection Technology Read All Ennoventure Secures $8.9M in Series A to Scale AI-Powered Brand Protection Technology Read All Go to Source
-
How Data Encryption Can Simplify Infrastructure Architecture
Learn how platform and security engineering teams can leverage Keyper’s data encryption capabilities to improve security standards, simplify infrastructure architecture, and enhance developer velocity. Read All Learn how platform and security engineering teams can leverage Keyper’s data encryption capabilities to improve security standards, simplify infrastructure architecture, and enhance developer velocity. Read All Go to Source
-
Educational Byte: Cryptography and Its Connection to Cryptocurrencies
Cryptography is the science of securing digital information and communications through complex mathematical techniques. It ensures that data (often digital data) remains confidential, authentic, and unaltered. Public key cryptography plays a vital role in ensuring the security and integrity of transactions for cryptocurrencies. In cryptocurrencies, private keys are used to sign transactions, and public keys…
-
Dazed and Confused: What’s Wrong with Crypto Libraries? — Threats to Validity
In this paper, researchers look into the types of problems that exist in various crypto libraries. Read All In this paper, researchers look into the types of problems that exist in various crypto libraries. Read All Go to Source
-
Dazed and Confused: What’s Wrong with Crypto Libraries? — Abstract and Introduction
In this paper, researchers look into the types of problems that exist in various crypto libraries. Read All In this paper, researchers look into the types of problems that exist in various crypto libraries. Read All Go to Source
-
Unlocking the Power of Zero-Knowledge Proofs
Sachin Kumar is working on zero-knowledge proofs (ZKPs) and smart contracts. A ZKP can trigger a smart contract without providing identifying information about the trigger. Kumar will co-found P2P Labs Inc. in 2023 to continue advancing this privacy-centric technology. Read All Sachin Kumar is working on zero-knowledge proofs (ZKPs) and smart contracts. A ZKP can…
-
Dazed and Confused: What’s Wrong with Crypto Libraries? — Conclusions
In this paper, researchers look into the types of problems that exist in various crypto libraries. Read All In this paper, researchers look into the types of problems that exist in various crypto libraries. Read All Go to Source