How to Get Started Using Java Cryptography Securely | | | | Encryption technologies are one of the essential elements of any secure computing environment. Even a tiny misconfiguration will leave an entire crypto-system open to attacks. However, coding secure crypto can be difficult due to the number of parameters that you need to configure. Veracode Principal Security Researcher Mansi Sheth recognized that many developers do not have the foundational knowledge in cryptography, and created a series of blog articles to teach you how to securely configure basic Java encryption. Read this entry in Mansi's blog series to learn: • An introduction to cryptography, and its importance to application security • Tips for choosing the right algorithms, including symmetric and asymmetric algorithms • How to use a Cryptographically Secure Pseudo-Random Number Generator (CSPRNG) Remember, crypto is hard! Do not be tempted to implement your own homegrown libraries. Read the blog for best practices in using Java cryptography securely.
Read The Blog → | | | | |
This email was sent to dasmith1973.blog@blogger.com. If you no longer wish to receive these emails you may unsubscribe at any time.
No comments:
Post a Comment