Recently Updated Pages
Symmetric and asymmetric encryption
Previously, you learned these terms: Encryption: the process of converting data f...
Symmetric and asymmetric encryption
Previously, you learned these terms: Encryption: the process of converting data from a read...
Public key infrastructure PKI
Computers use a lot of encryption algorithms to send and store information online. They'r...
Fundamentals of cryptography
The internet is an open, public system with a lot of data flowing through it. Even though...
Heather: The importance of protecting PII
Hello, my name is Heather and I'm the Vice President of Security Engineering at Goo...
Information privacy: Regulations and compliance
Security and privacy have a close relationship. As you may recall, people have the right to contr...
最小権限の原則
translated with "MixerBox translate" using chatgpt4 as i suck at reading japanese still im not su...
Principle of least privilege
Security controls are essential to keeping sensitive data private and safe. One of the most commo...
Security controls
These days, information is in so many places at once. As a result, organizations are unde...
Welcome to week 2
I was fascinated by a world-wide malware event that happened in 2017. I started watching ...
The data lifecycle
Organizations of all sizes handle a large amount of data that must be kept private. You learned t...
The NIST Cybersecurity Framework
Having a plan is just one part of securing assets. Once the plan is in action, the other ...
Elements of a security plan
Security is all about people, processes, and technology. It's a team effort, and I mean t...
The emergence of cloud security
One of the most significant technology developments this century has been the emergence of cloud ...
Security guidelines in action
Organizations often face an overwhelming amount of risk. Developing a security plan from the begi...
Common classification requirements
Asset management is the process of tracking assets and the risks that affect them. The idea behin...
Security starts with asset classification
It can be really stressful when you have trouble finding something important. You're late...
Tri: Life in asset security
I'm Tri, a security engineer at Google. My department is Detection and Response. Let's see,...
Understand risks, threats, and vulnerabilities
When security events occur, you’ll need to work in close coordination with others to address the ...
Da'Queshia: My path to cybersecurity
Hi. My name is Da'Queshia. I'm a security engineer. That basically means I work securing Go...