Tag: cryptographic keys
-
Alerts: USDA Releases Success Story Detailing the Implementation of Phishing-Resistant Multi-Factor Authentication
Source URL: https://www.cisa.gov/news-events/alerts/2024/11/20/usda-releases-success-story-detailing-implementation-phishing-resistant-multi-factor-authentication Source: Alerts Title: USDA Releases Success Story Detailing the Implementation of Phishing-Resistant Multi-Factor Authentication Feedly Summary: Today, the Cybersecurity and Infrastructure Security Agency (CISA) and the U.S. Department of Agriculture (USDA) released Phishing-Resistant Multi-Factor Authentication (MFA) Success Story: USDA’s FIDO Implementation. This report details how USDA successfully implemented phishing-resistant authentication for its…
-
Schneier on Security: Watermark for LLM-Generated Text
Source URL: https://www.schneier.com/blog/archives/2024/10/watermark-for-llm-generated-text.html Source: Schneier on Security Title: Watermark for LLM-Generated Text Feedly Summary: Researchers at Google have developed a watermark for LLM-generated text. The basics are pretty obvious: the LLM chooses between tokens partly based on a cryptographic key, and someone with knowledge of the key can detect those choices. What makes this hard…
-
Hacker News: Transitioning the Use of Cryptographic Algorithms and Key Lengths
Source URL: https://csrc.nist.gov/pubs/sp/800/131/a/r3/ipd Source: Hacker News Title: Transitioning the Use of Cryptographic Algorithms and Key Lengths Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses NIST’s updated guidance on cryptographic key management, emphasizing the transition to stronger cryptographic methods and the retirement of outdated algorithms. This is crucial for professionals in the…
-
Cloud Blog: You can now sign Microsoft Windows artifacts with keys protected by Cloud HSM
Source URL: https://cloud.google.com/blog/products/identity-security/you-can-now-sign-microsoft-windows-artifacts-with-keys-protected-by-cloud-hsm/ Source: Cloud Blog Title: You can now sign Microsoft Windows artifacts with keys protected by Cloud HSM Feedly Summary: To build trust in the software world, developers need to be able to digitally sign their code and attest that the software their customers are downloading is legitimate and hasn’t been maliciously altered.…