Zero-knowledge proofs are an effective tool for improving the security and privacy of decentralised networks. A zero-knowledge proof is a mathematical technique that allows for one party (the prover) to prove to another party (the verifier) that they know the value of a specific piece of information without revealing the actual information. The most well-known […]
Category: Cybersecurity
Limitations of Anti-Virus Software: Stuxnet, Duqu, Flame and Red October
This post will be a short technical comparison of the biggest advanced persistent threats over the last 10 years; Stuxnet, Duqu, Flame and Red October. Stuxnet Stuxnet was spotted as early as June 2009 and this was one of the first major APT’s due to the impressive change in the complexity in comparison to traditional […]
An Introduction to Multi-level Security Confidentiality: Clark-Wilson and Brewer Nash Models vs Bell-Lapadula and Biba Models
The Biba Model was developed by Kenneth J. Biba and released in 1977 as a security model which focuses on the integrity of data. This was intended for non-military organisations where the integrity of data was more important than the confidentiality of data. This model is built on the state machine concept which focuses on […]
5 Secure Coding Practices for Software Engineers
Developers work towards solving specific issues and since programming is a skill used in many industries, this means there are a lot of developers who are designing and creating solutions/applications. A challenge faced by developers when writing secure software is the vast amount of tutorials available on the internet. These tutorials successfully demonstrate how to […]
Creating an IdentityIQ Cluster
Today we will be looking at creating our very first IdentityIQ (IIQ) cluster. We will be focusing both on the environment setup as well as IIQ instance and cluster configuration. The entire process of getting your own cluster setup and running will take up to 1 hour. Architecture The architecture I will be using will […]
Installing Sailpoint IdentityIQ 7.3
This post will be focusing on the initial set up involved when creating your very own IdentityIQ instance. The entire process of getting your instance up and running will take approximately 20 minutes providing you already have your environment setup. Getting Started I would highly suggest taking a look through the official installation guide provided […]