josh lake

Josh Lake

Josh Lake is a writer who focuses on the intersections between technology, privacy and security. His work helps companies and individuals get the most out of technological developments, without having to sacrifice their civil liberties or open themselves up to the ever-increasing threats of cybercrime.

Articles by Josh

Key derivation functions (KDFs) play a vital role in our security. They help us create strong keys, allow us to store passwords and more.
By Josh Lake in Information Security on September 12, 2023
Fernet makes it easy for Python developers to implement encryption and authentication into their applications.
By Josh Lake in Information Security on September 5, 2023
The CIA triad are three critical attributes for data security; confidentiality, integrity and availability.
By Josh Lake in Information Security on November 1, 2023
Single sign-on can make life easier for users and help to boost an organization's overall security. We reveal the pros and cons of single sign-on and whether you should use it.
By Josh Lake in Information Security on August 1, 2023
If a preimage attack is possible against the cryptographic hash functions we use, it could completely undermine our online security.
By Josh Lake in Information Security on October 27, 2023
Websites and apps use dark patterns to manipulate us into taking actions that we may not want to take. Find out how they violate our privacy.
By Josh Lake in Information Security on June 14, 2022
Collision attacks threaten the security of cryptographic hash functions, which form critical parts of our cybersecurity infrastructure. This article covers everything you should know about collision attacks.
By Josh Lake in Information Security on September 13, 2023
Password cracking is one of the tools that hackers turn to when they can't gain access to an account by other means. Find out how they do it.
By Josh Lake in Information Security on November 22, 2023
SHA-2 is a hash function that plays a critical role in much of our online security. Find out what it is, where it's used and how it works.
By Josh Lake in Information Security on February 17, 2022
Page 1 of 7
127