Thursday, November 16, 2017

Crypto is hard. Here’s what you need to know.

How to Get Started Using Java Cryptography Securely

Event Image

Read The Blog
 
 

Encryption technologies are one of the essential elements of any secure computing environment. Even a tiny misconfiguration will leave an entire crypto-system open to attacks. However, coding secure crypto can be difficult due to the number of parameters that you need to configure.

Veracode Principal Security Researcher Mansi Sheth recognized that many developers do not have the foundational knowledge in cryptography, and created a series of blog articles to teach you how to securely configure basic Java encryption.

Read this entry in Mansi's blog series to learn:

• An introduction to cryptography, and its importance to application security
• Tips for choosing the right algorithms, including symmetric and asymmetric algorithms
• How to use a Cryptographically Secure Pseudo-Random Number Generator (CSPRNG)

Remember, crypto is hard! Do not be tempted to implement your own homegrown libraries. Read the blog for best practices in using Java cryptography securely.

 
Read The Blog →
 
 

Contact Us

Sales: 888-937-0329

Support: 877-837-2203

EMEA: +44 (0)203 761 5501

Visit the new Community!

65 Network Drive

Burlington, MA 01803

 
 
Twitter
Facebook
LinkedIn
 
                                                           

This email was sent to dasmith1973.blog@blogger.com. If you no longer wish to receive these emails you may unsubscribe at any time.

No comments: