This article discusses security controls that reduce the risk of unauthorized access or misuse, information leakage and unauthorized physical access, mostly.
Posts by Collection
The verification of digital signatures ensures that a message wasn’t altered and that the sender is the one who ‘signed’ the message, the owner of the key pa...
To have a better understanding of what it is and how a blockchain works, one must know a few things about cryptography. Hashes, cryptographic key pairs and d...
A collection of documents, standards and regulations to help the information security practitioner.
The downloaded copy of the operating system must also have its digital signature verified before installation on a new host or virtual machine.
A script that downloads the image and verifies the digital signature and hashes of Debian Linux.
What is cryptography and how does it work in the real world? A lecture about Applied Cryptography, written in English and translated to Portuguese.
A small presentation written in English regarding cloud security.
A lecture from my MBA class about information security strategic management, covering compliance, risk management, ISMS frameworks and ISO/IEC standards.
A long lecture written in English showing examples of buffer overflows and other memory vulnerabilities and how to exploit them.
A presentation written in English and translated to Portuguese defying the concept of obscurity and how it has been misinterpreted by the security community.
A presentation written in English summarizing security best practices for password-based authentication.
A lecture written in English and translated to Portuguese describing patch and vulnerability management process.