AWS |
AWS Partner Network (APN) Blog |
Using Amazon Macie with Komprise for Detecting Sensitive Content in On-Premises Data |
https://aws.amazon.com/blogs/apn/using-amazon-macie-with-komprise-for-detecting-sensitive-content-in-on-premises-data/
|
Using Amazon Macie with Komprise for Detecting Sensitive Content in On Premises DataFrom a single pane of glass in Komprise you can gain visibility across your data silos tag files with granular metadata to support easier search for precise data sets and create intelligent policies to migrate infrequently used data to economical storage targets and or leverage cloud based AI ML services Walk through the process of using Komprise with Amazon Macie a fully managed data security and data privacy service that uses machine learning and pattern matching to discover sensitive content such as PII |
2022-09-20 20:51:55 |
海外TECH |
DEV Community |
How Does WebAuthn Work? |
https://dev.to/passage/how-does-webauthn-work-25p3
|
How Does WebAuthn Work In my previous post I discussed why passwords are problematic at best and a severe security threat at worst However you probably currently have a password based authentication solution Hopefully you have implemented some type of Multi factor Authentication You might even have implemented Brute Force Password Protection and Breached Password Detection But in the end you realize that passwords are still a problem Of course after reading all that you were probably thinking “But what else is there Well thankfully some very smart people have been working on this problem They formed an organization worked the problem and came up with a delightfully effective solution The FIDO AllianceIn July of The Fast Identity Online Alliance FIDO was formed by PayPal Lenovo and other organizations interested in getting rid of the password Soon enough Google Microsoft and Apple got on board along with many other companies Passage is a member of the FIDO Alliance FIDO soon developed open and free specifications for doing passwordless authentication The key specification is the WebAuthn standard approved by the World Wide Web Consortium WC WebAuthn uses public key cryptography to allow browsers and web resources to authenticate using passwordless methods such as biometrics This solution is formally called “Multi device FIDO Credentials but informally they are called “Passkeys Passkeys are based on a FIDO developed protocol called WebAuthn How WebAuthn WorksWebAuthn is quite clever It leverages the power of public key cryptography to create a way for users to login to mobile and web applications without those applications having to store any secret information at all Normally when one thinks of public key cryptography one thinks of using it to send a secret message to a person who then decrypts it and reads it Well this can kind of work in reverse If you send them a message encrypted with their public key then they and only they are the only one who can decrypt because only they have the private key that corresponds to the given public key Once they do you can be highly confident that they are the entity that they say they are Currently all the major browsers Chrome Firefox Edge and Safari all support the WebAuthn specification If your phone iPhone or Android has a fingerprint reader or facial scanner it supports WebAuthn Windows provides WebAuthn support via Windows Hello All of this translates to passwordless authentication quite nicely WebAuthn typically goes like this You want to log in to a website so you go to it The website asks for your unique identifier usually your email address or phone number They may also ask for a username The website gets the information and realizes that it has never heard of you before The website says “Hey send me a public key that is unique to me You validate yourself on your device This can be via biometrics a PIN or inserting something like your Yubikey Once validated your device generates a unique public private key specific associated only with that website You send the site your public key The site stores that for later use You save the private key on your device Note that no secret information at all leaves your device At this point the site doesn t know for sure you actually are you so it may want to verify who you actually are usually by sending a magic link to your email or phone number Note that the application doesn t have to do this because it s not required via the protocol but it will likely want to so it can communicate with you You click on the link in the message and the website knows that you actually are the person on the other side of that identifier Now you are verified by the site The next time you want to login you go to the site and give your identifier email phone number The site sends you a known chunk of data as a challengeYou device then signs this challenge with your private key and sends it back The site decrypts the data with your public key If what you sent back matches what the site sent they you are authenticated Now that s a lot of steps and looks pretty complicated but most of it happens behind the scenes and is done by the implementation of WebAuthn But more importantly it s really simple for your users All they have to supply is a press on a fingerprint reader or a FaceID impression or some other “thing that you are The code does the rest It works great is very very secure and happens quickly and easily No fumbling around with passwords no bringing up authenticator applications no checking your email or texts and no worries about compromise How Do Passkeys Fit In At it s heart a passkey is really just the private key that gets created for every place a user logs in That passkey is securely stored on your phone within a “Trusted Platform Module or TPM A TPM is a special chip now included with most modern devices and computers For example it s required to be present in order for Windows to be installed The TPM is excessively difficult to compromise even if a nefarious actor gets possession of your phone The nice part about passkeys is that they can be shared amongst different devices both within and eventually between ecosystems Google Microsoft and Apple have figured out a way to securely save those passkeys within their eco systems so you can even share them between devices There is even a way to move from one platform to another For instance if you are a totally committed Apple person you can log in to a site one time on your iPhone with a passkey and then that passkey is automatically shared between all of your Apple devices If you are a “mixed person and have a MacBook and an Android phone you can transfer your login from your MacBook to your Android phone via a QR Code The process is quite secure and it uses Bluetooth LE to ensure that the device displaying the QR Code and the device reading the QR Code are in close proximity to each other In addition your Android phone creates a new passkey during the process that is then shareable across the Google ecosystem You can migrate your login to a Windows device using the same system The bonus here is that if you lose or upgrade your phone all your passkeys are immediately available on your new device without any hassle So that is how it all works But as before this raises questions “Is this more secure is probably one that comes up And that will be covered in my next post |
2022-09-20 20:26:15 |
海外TECH |
DEV Community |
What is use of Recycle Bin in AWS EBS Snapshots ?. |
https://dev.to/aws-builders/what-is-use-of-recycle-bin-in-aws-ebs-snapshots--585m
|
What is use of Recycle Bin in AWS EBS Snapshots You can restore accidentally deleted Amazon EBS snapshots with the Recycle Bin feature If your resources are deleted they are retained in the Recycle Bin for a time period that you specify before being permanently deleted You can restore a resource from the recycle bin at any time If you restore a resource from the Recycle Bin it will be removed from the Recycle Bin and you can use it the same way you use any other resource in your account The resource is deleted from the recycle bin if the retention period is not renewed Using Recycle Bin helps to make sure business continuity via defending your business critical facts in opposition to unintentional deletion Working of Recycle BinIn order to use Recycle Bin you have to create retention rules in the regions where you want to protect your resources Retention rules can be found here You want to protect the resource type When resources are deleted you want to keep them in the recycle bin Resources can be retained in the recycle bin before they are deleted There are two types of retention rules with Recycle Bin Tag level retention rulesResource tags are used to identify resources that will be retained in the recycle bin You specify one or more tag key and value pairs for each retention rule Resources of the specified type that are tagged with at least one of the tag key and value pairs are automatically retained in the recycle bin If you want to protect specific resources in your account use this type of retention rule Region level retention rulesResource tags are not specified in a Region level retention rule Even if the resources are not tagged it applies to all of them If you want to protect resources in a specific region use this type of retention rule The resource remains in the Recycle Bin till one of the following happens You restore it manually When you restore a resource from the Recycle Bin it is immediately available for use You can use restored resources the same way as other resources in your account The retention period is over The resource can no longer be viewed or restored if the retention period is over Resource types supported by Recycle Bin are Amazon EBS snapshotsAmazon EBS backed Amazon Machine Images AMIs PricingThe Recycle Bin has resources billed at their standard rates There are no charges for using recycle bin and retention rules Gratitude for perusing my article till the end I hope you realized something unique today If you enjoyed this article then please share it with your buddies and if you have suggestions or thoughts to share with me then please write in the comment box Follow me and share your thoughts GitHubLinkedInTwitter |
2022-09-20 20:12:36 |
海外TECH |
DEV Community |
Destructuring and abstracting the fetchData in React |
https://dev.to/vinibgoulart/destructuring-and-abstracting-the-fetchdata-in-react-3526
|
Destructuring and abstracting the fetchData in React What will be done We ll learn how destructure and abstract the fetchData in React It ll make our applications more performative and scalable StartingI ll use a project base to start this post that you might access in my GitHub in this repo abstracting fetchData using start branch In it there is a react application created in the usual way with some routes components and hooks Clone the project in your computer and install dependencies running yarn The project base has two pages that you can navigate through the navbar The Github page calls the github API and shows some profile data The Pokemon page calls the pokeapi and shows some pokemonn data Commom modeEverybody know that abstracts component logic into hooks is good to performatic applications it makes testing easier and more scalable Most projects use this architecture components with their logic decoupled in hooks We can see this here Here we have a hook consulting github api And here we have a hook consulting pokeapi You can see that both hooks have a fetch on some URL Have you ever thought about how you can abstract this and the application go the usual way Fortunately react provides this functionality of render the components when other linked component changes You will understand better soon Abstracting fetch DataLet s abstract the fetchData Create a new file in src gt hooks gt useFetch ts import useEffect useState from react export const useFetch lt T gt url string gt const response setResponse useState lt T gt useEffect gt const fetchData async gt const res await fetch url const data await res json setResponse data fetchData url return response Here we have a function that accepts a url parameter and does a new fetch when the url changes setting and returning the data Now our custom hooks will call this hook passing as param the url import useFetch from useFetch interface Github name string avatar url string export function useGithub const response useFetch lt Github gt return github response src gt hooks gt useGithub tsimport useFetch from useFetch interface Pokemon name string sprites front default string export function usePokemon const response useFetch lt Pokemon gt return pokemon response src gt hooks gt usePokemon tsIs necessary change the page component also put a optional chaining in objects like github avatar url Voilà We abstract the useFetch logic making scaling and testing easier You might access final project here abstracting fetchData |
2022-09-20 20:03:11 |
海外TECH |
DEV Community |
Hacktoberfest 2022 is coming ! |
https://dev.to/thomasbnt/hacktoberfest-2022-is-coming--101k
|
Hacktoberfest is coming It s September th and in days Hacktoberfest will be here What is the date From October st →October st Who can join this event Contributors maintainers companies and event organizers How I can participate From October st to October st you will have to contribute to the Open Source by making Pull requests available on GitHub and GitLab You will be able to follow your progress on the dashboard which will be available on the Hacktoberfest website More information on the website at participation contributorsLast year I did the same type of post This time I m also asking you what projects you have that need contributors Feel free to put your repositories in comments using the embed format embed is coming f Resources for beginnersPull Merge request detailsMaintainers Open Source |
2022-09-20 20:03:03 |
Apple |
AppleInsider - Frontpage News |
How to master the iPhone 14 Pro & iPhone 14 Pro Max camera |
https://appleinsider.com/inside/iphone-14-pro/tips/how-to-master-the-iphone-14-pro-iphone-14-pro-max-camera?utm_medium=rss
|
How to master the iPhone Pro amp iPhone Pro Max cameraThere is an incredibly capable Camera and app on the all new iPhone Pro and iPhone Pro Max Here s how to get the best shots possible iPhone Pro and iPhone Pro Max have the same camerasBoth iPhone Pro and iPhone Pro Max have a trio of cameras to work with on the back The primary camera is a MP wide angle lens and it is saddled with a MP ultra wide lens and a MP telephoto lens Read more |
2022-09-20 20:17:51 |
Apple |
AppleInsider - Frontpage News |
Paste issue fixed & battery indicator refined in new iOS 16.1 beta |
https://appleinsider.com/articles/22/09/20/paste-issue-fixed-battery-indicator-refined-in-new-ios-161-beta?utm_medium=rss
|
Paste issue fixed amp battery indicator refined in new iOS betaApple s iOS developer beta released on Tuesday fixes a bug relating to pasting permissions as well as makes revisions to how the battery indicator works Apple released the second developer beta for iOS on Tuesday and early exploration of the release reveals a few interesting additions to the iPhone operating system The first is a bug that has plagued iOS users with prompts whenever they go to copy and paste data from one app into another The repeated prompts have annoyed users and Apple did confirm on Monday that it would be looking into the matter Read more |
2022-09-20 20:19:37 |
海外TECH |
Engadget |
GM wants to help shape the EPA's next clean car standard |
https://www.engadget.com/gm-edf-epa-emissions-standards-principles-203116975.html?src=rss
|
GM wants to help shape the EPA x s next clean car standardGM wants to exclusively sell electric vehicles by and it s now trying to nudge the US government toward the same goal The automaker has teamed up with an advocacy group the Environmental Defense Fund EDF to develop recommended principles for the Environmental Protection Agency s EPA car emissions standards from the model year onward The guidelines are meant to accelerate EV adoption in a socially conscious way ーand of course help GM s bottom line The brand wants standards that ensure at least half of new vehicles sold by are zero emissions by with a percent reduction in emissions across a lineup compared to They need to address multiple pollution sources such as CO nitrogen oxides and particles and be quot performance based quot GM argues The company also believes there should be an optional pathway to speed up the launch of breakthrough emissions reducing technology and that standards should ensure the benefits of reduced pollution apply to everyone such as vulnerable communities Not surprisingly GM hopes for tight coordination between the public and private realms including complementary investments GM and the EDF want a quick decision process They d like the standards to be proposed this fall and completed by fall The standards should last until at a minimum the partners said but they also hoped the EPA would extend that to There might not be much opposition to the basic concept President Biden already wants half of new vehicles to be emissions free by and the EPA reversed Trump era standards rollbacks in December Meanwhile California Massachusetts and New York State expect to ban sales of new gas powered cars by and frequently push for stricter standards than the federal government The principles and resulting EPA standards would theoretically help politicians reach these targets sooner by encouraging manufacturers to electrify their fleets quickly Whether or not GM and the EDF get their way isn t clear The EPA isn t guaranteed to take the principles to heart and a change of presidents could lead to weaker rules We d add that GM has altered its stance on emissions reductions depending on who s in office The firm backed the Trump administration s efforts to revoke waivers letting California set tougher requirements only to change its tune after Biden won the election Still we wouldn t expect GM to back out any time soon The company has staked its future on EVs and it stands to profit if the market shifts to eco friendly vehicles a little sooner |
2022-09-20 20:31:16 |
金融 |
ニュース - 保険市場TIMES |
楽天損保、火災保険「ホームアシスト」にマンション居住者専用法律相談サービスを導入 |
https://www.hokende.com/news/blog/entry/2022/09/21/060000
|
楽天損保、火災保険「ホームアシスト」にマンション居住者専用法律相談サービスを導入マンションでは近隣トラブルが起きやすい楽天損保は月日、住宅向け火災保険「ホームアシスト家庭総合保険」にマンション居住者専用の法律相談サービスを導入すると発表した。 |
2022-09-21 06:00:00 |
ニュース |
BBC News - Home |
Ukraine war: Occupied areas call urgent vote to join Russia |
https://www.bbc.co.uk/news/world-europe-62965998?at_medium=RSS&at_campaign=KARANGA
|
urgent |
2022-09-20 20:02:58 |
ニュース |
BBC News - Home |
Iran protests: Women burn headscarves in anti-hijab protests |
https://www.bbc.co.uk/news/world-middle-east-62967381?at_medium=RSS&at_campaign=KARANGA
|
amini |
2022-09-20 20:26:47 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
100円で加入できる「熱中症保険」5万件の大ヒット!住友生命子会社に学ぶ“新鉱脈” - 動乱の少額短期保険 115社ランキング2022 |
https://diamond.jp/articles/-/309420
|
paypay |
2022-09-21 05:25:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
鉄道「廃線危険度」ランキング【私鉄・公営196路線】首都圏の著名私鉄が崖っぷち - JR・私鉄「全国376路線」ランキング |
https://diamond.jp/articles/-/309866
|
浮き彫り |
2022-09-21 05:20:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
金融庁が「仕組み債」にメス!顧客を食い物にしてきた証券業界を襲う2大逆風 - 野村VSメガバンク 市場大乱の死闘 |
https://diamond.jp/articles/-/309880
|
仕組み債 |
2022-09-21 05:15:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
農協の押し売りで90代女性が25件の共済契約!被害者抗議にJA開き直りの保身術 - JAと郵政 昭和巨大組織の病根 |
https://diamond.jp/articles/-/309467
|
|
2022-09-21 05:10:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
【動画】JA共済の被害者3人が怒りの告発!農協職員による違法契約で90代女性が犠牲に - JAと郵政 昭和巨大組織の病根 |
https://diamond.jp/articles/-/309466
|
中部地方 |
2022-09-21 05:05:00 |
ビジネス |
電通報 | 広告業界動向とマーケティングのコラム・ニュース |
コメ兵は「好奇心製造業」へ。自社の価値を深さのある「最大公約数」で再規定する。 |
https://dentsu-ho.com/articles/8335
|
futurecreativecenterfcc |
2022-09-21 06:00:00 |
ビジネス |
電通報 | 広告業界動向とマーケティングのコラム・ニュース |
まほうびん記念館に見るプロの矜持とおもてなしの心 |
https://dentsu-ho.com/articles/8325
|
領域 |
2022-09-21 06:00:00 |
北海道 |
北海道新聞 |
住民投票は「パロディー」 仏大統領、効果ないと断言 |
https://www.hokkaido-np.co.jp/article/733981/
|
親ロシア派 |
2022-09-21 05:27:15 |
北海道 |
北海道新聞 |
韓国大統領、北朝鮮には触れず 国連初演説で核脅威強調 |
https://www.hokkaido-np.co.jp/article/733984/
|
国連総会 |
2022-09-21 05:27:15 |
北海道 |
北海道新聞 |
「トウキョウ」でなく「イワキ」 サンショウウオ、実は新種 |
https://www.hokkaido-np.co.jp/article/733985/
|
国立科学博物館 |
2022-09-21 05:17:00 |
北海道 |
北海道新聞 |
キャサリン妃、日本の真珠着用 葬儀で、女王から受け継ぎ |
https://www.hokkaido-np.co.jp/article/733983/
|
葬儀 |
2022-09-21 05:17:00 |
北海道 |
北海道新聞 |
<宇野沢デジタル委員が読み解く>大学の部活 存続に苦戦 |
https://www.hokkaido-np.co.jp/article/733782/
|
課外活動 |
2022-09-21 05:02:00 |
北海道 |
北海道新聞 |
夢さぽピックアップ |
https://www.hokkaido-np.co.jp/article/733781/
|
合同企業 |
2022-09-21 05:01:00 |
ビジネス |
東洋経済オンライン |
平気で「スーパーの惣菜」買う人の超残念な5盲点 「店内でやる作業といえば…」驚きの実態とは? | 健康 | 東洋経済オンライン |
https://toyokeizai.net/articles/-/619047?utm_source=rss&utm_medium=http&utm_campaign=link_back
|
東洋経済オンライン |
2022-09-21 05:40:00 |
ビジネス |
東洋経済オンライン |
今こそ冷静に考えたい「アベノミクス」失敗の理由 安倍政権によって日本経済はどうなったか | 政策 | 東洋経済オンライン |
https://toyokeizai.net/articles/-/620385?utm_source=rss&utm_medium=http&utm_campaign=link_back
|
安倍政権 |
2022-09-21 05:20:00 |
コメント
コメントを投稿