This first blog post in our series about differential cryptography describes the design of symmetric block ciphers. These are encryption algorithms, where the same secret key is used for encryption and decryption.
Part eight of the linux container series illustrates the purpose of two cgroup resource controllers: Network and Block I/O. The Network controller is used to control network sockets, while the Block controller is being utilized to enable I/O resource usage policies.
Recent developments in healthcare have resulted in the combination of medical devices and the Internet-of-Things (IoT). With medical devices underlying special regulations and used in very specific contexts, the question arises how security assessments can be performed to address the sector-specific demands. This is the first post of our new IoT healthcare security series.