Cybersecurity Software-Technology

JWT Handbook

For those unaware (like me earlier this week), JWT stands for JSON Web Token. JSONs are a standard formats computers on the Internet exchange data in. JWTs are a standardized way to pass encrypted information from a client to a server to prevent tampering. To provide security, it uses modern encryption tools along with a signature and information stored in the header of a web transaction. Thus, web users cannot tamper with information for malicious…

Continue reading

Management-Business Psychology

The Art of Attack: Attacker Mindset for Security Professionals

Today, when most people hear “security,” they think of protection against hackers on the Internet. Indeed, the explosion of information available online has exposed an almost infinite number of vulnerabilities. However, many forget that every vulnerability starts with a human actor. Understanding that attacker’s psychology, therefore, provides a paramount route of defense. In this book, Maxie Reynolds, a security analyst, seeks to teach readers how to master the attacker mindset so that they can anticipate…

Continue reading