Check out my .com site https://debinfosec.com. I decided to get a full .com site, as a result my latest posts are at debinfosec.com. Check it out! Advertisements
I started a Cybersecurity News Aggregator website so you can stay up to date with the latest in cyber threats without all the distraction on twitter. Check it out! https://cysreport.com. I also have started a threat briefing podcast. My podcast is now on Apple iTunes, so please subscribe.
I was honored to participate in a panel with some other awesome women in cybersecurity. Take a listen: https://www.brighttalk.com/webcast/14643/245367
We are working on the knowledge base now so stay tuned! Update: I just found out that Cisco has fully funded through a gift grant the Cryptographic Knowledge Base that will be managed and overseen by Johns Hopkins University and specifically Seth Nielson and Matthew Green. I am honored to be working with the best … More Working on a Crypto Best Practices Knowledge Base with JHU
Use: TLS v1.1 and 1.2 Avoid: TLSv1.0 or lower or SSLv3 or lower TLS Recommended Ciphers: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5289 TLS_ECDHE_ECDSA_WITH_AES_192_CBC_SHA256 as defined in RFC 5289 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 as defined in RFC 5289 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 as defined in RFC 5289 TLS_ECDHE_ECDSA_WITH_AES_192_GCM_SHA256 as defined in RFC 5289 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5289 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as defined … More Recommended TLS Ciphers
How does Common Criteria relate to ISO 27001? ISO 27001:2013 is a standard that covers a company’s Information Security Management System (ISMS). The big change between the 2005 version and the 2013 version of the ISO 27001 is that all risk is now described in terms of protecting information. Where is the company’s information stored? How … More ISO 27001 and Common Criteria
For SSHv2 key exchange: Recommended: diffie-hellmann-group14-sha1 (2048 bit) for SSH key exchange Allowed: ecdh-sha2-nistp256, ecdh-sha2-nistp384, and ecdh-sha2-nistp521 Avoid: diffie-hellman-group1-sha1 (768 bit),diffie-hellman-group2-sha1 (1024 bit) dh group 1 should not be used based on this research paper “Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice.” In addition, dh group 2 and below are susceptible to the logjam attack. … More SSH Algorithms to Use