<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: sampatellive</title>
    <description>The latest articles on DEV Community by sampatellive (@sampatellive).</description>
    <link>https://dev.to/sampatellive</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F589528%2Fd86fb8c0-44dc-45a2-8f2c-2682294d829c.png</url>
      <title>DEV Community: sampatellive</title>
      <link>https://dev.to/sampatellive</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/sampatellive"/>
    <language>en</language>
    <item>
      <title>Top 8 Cyber Security Trends to Follow for 2022</title>
      <dc:creator>sampatellive</dc:creator>
      <pubDate>Tue, 24 Aug 2021 05:37:57 +0000</pubDate>
      <link>https://dev.to/sampatellive/top-8-cyber-security-trends-to-follow-for-2022-1i7j</link>
      <guid>https://dev.to/sampatellive/top-8-cyber-security-trends-to-follow-for-2022-1i7j</guid>
      <description>&lt;h2&gt;
  
  
  Here's Emerging Cyber Security Trends That You Should Watch Out &amp;amp; Get Familiar With to Improve Your Internet Privacy &amp;amp; IT Security
&lt;/h2&gt;

&lt;p&gt;In today's technology-driven world, cyberattacks are becoming quite a norm. From your personal information getting exposed by hackers to impacting your business through shutting down entirely from hours to days, your company can be vulnerable to numerous cyber-attacks. Furthermore, &lt;a href="https://www.statista.com/markets/424/topic/1065/cyber-crime-security/#statistic1"&gt;according to Statista&lt;/a&gt;, an average cost of a data breach is around the US $ 3.86 million.&lt;/p&gt;

&lt;p&gt;However, professionals that have advanced cybersecurity degree are capable of assisting organizations in preventing such attacks. For instance, such cybersecurity professionals have the technical skills and knowledge required to build &lt;a href="https://cheapsslsecurity.com/blog/8-cyber-security-tips-for-small-business/"&gt;cybersecurity strategies to protect organizations from becoming victims of cyberattacks.&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Likewise, if you're a cybersecurity professional then, it's recommended that you stay updated with the latest cyber security trends that can help you upgrade yourself and stay up in the technology-driven world.&lt;/p&gt;

&lt;h3&gt;
  
  
  Emerging Trends Every Cybersecurity Professional Should Be Aware of
&lt;/h3&gt;

&lt;p&gt;Due to cyber attacks that happen daily, cybersecurity is among the high-demand field, and professionals who choose to make their careers within cybersecurity tend to have a brighter future. &lt;/p&gt;

&lt;p&gt;Likewise, according to the &lt;a href="https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm"&gt;Bureau of Labor Statistics&lt;/a&gt;, the cybersecurity industry will grow around 31% by 2029, compared to other industries. Therefore, to make sure you make best of it, here are some of the emerging trends in cyber security that we recommend you should stay aware of and take advantage of it:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; AI Integration
Smaller companies that don't have separate cyber security departments may start implementing AI (Artificial Intelligence) strategies. Likewise, AI is also useful for analyzing the massive amount of data for identifying threats. However, on the flip side, cybercriminals may use artificial intelligence to find vulnerabilities within an organization's technological infrastructure.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Therefore, it's quite evident that it'll become one of the emerging trends in cyber security that you should keep a tab on and learn about AI security as a cyber security professional.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Remote Work
COVID-19 pandemic has bought a lot of change, and working from home is one of the vital differences everyone witnessed. According to the &lt;a href="https://www.upwork.com/i/future-workforce/fw/2020/"&gt;report of Upwork&lt;/a&gt;, 36+ million Americans will be working by 2025, which means around an 87% increase rate compared to pre-pandemic stats. However, attacks on organizations have increased due to remote work, as employees often use their devices that may not be as secure as they should be. Furthermore, cybercriminals often get benefitted from misconfigured cloud security, insecure devices of home and networks.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;And, because of such attacks, there's an increased demand for cybersecurity professionals, and it'll remain one of the trending topics in cyber security as well. Therefore, it's recommended that as a cybersecurity professional, you stay aware of its growth and keep yourself updated on how to keep an organization safe from attacks that occur because of remote work.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; ZTNA (Zero Trust Network Access)
Organizations are shifting towards ZTNA (Zero Trust Network Access) from VPNs (Virtual Private Network) as it offers enhanced security because individuals have to log in using multifactor authentication. Likewise, according to the &lt;a href="https://www.gartner.com/teamsiteanalytics/servePDF?g=/imagesrv/media-products/pdf/Qi-An-Xin/Qi-An-Xin-1-1OKONUN2.pdf"&gt;"Zero Trust Architecture and Solutions,"&lt;/a&gt; – a recent study by Gartner, organizations will see a boost of around 60% in the usage of ZTNA compared to relying upon VPN like earlier. In addition, it provides security by limiting employees' access to data while giving access to only those data that are required to complete their assigned work.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Therefore, as a security developer, you should be aware of ZTNA and how to optimally use it, as it'll become one of the trending topics in cyber security.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Insider Threats
Insider threats are an attack or a threat that comes from within the organization that's targeted. It usually involves someone like the present or former business associate or employee who has access to the company's critical information or any admin type account and misuses it.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;And there have been multiple cases where such threats have taken place. For example, an insider threat occurred earlier in summer 2019 when one of the former employees of AWS (Amazon Web Services), Paige Thompson, accessed the personal information of Capital One credit card customers and applicants from Amazon Web Services along with 30 other companies. &lt;/p&gt;

&lt;p&gt;Likewise, the firewall was misconfigured. As a result, it became possible for Thompson to get buckets of data and access those important folders in the AWS storage space of Capital One. And, later in July 2019, Capital One even admitted that Thompson had got access to critical information of 106 million customers and credit card applicants in Canada and the United States. &lt;/p&gt;

&lt;p&gt;And, predictably, an insider threat is something that will continue to emerge even in the coming time. Therefore, it's recommended that cybersecurity professionals be aware of this danger as it's a trending topic in cybersecurity that shouldn't be taken for granted.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Supply Chain Attacks
A supply chain attack is a cyberattack where an attacker goes for a company by finding weaker links within an organization's supply chain. Likewise, the supply chain is called the network of organizations, people, events, resources, and technology that are involved in developing and selling a particular product. &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Furthermore, the supply chain consists of everything, such as delivering materials from supplier to manufacturer and delivering the finished product to end-users. Therefore, the supply chain attack is among the weak points, and targeting cyber attackers can take advantage of it successfully. Lastly, a supply chain attack is possible within all industry types that have a contract with third-party vendors like government and financial sectors. &lt;/p&gt;

&lt;p&gt;Henceforth, it's recommended that cybersecurity professionals get aware of it and learn how to keep the supply chain safe and secure from attackers, as it's among emerging trends in cyber security.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;IoT Security&lt;br&gt;
The IoT (Internet of Things) is among the versatile technology that exists today. And, the presence of the internet and various other connected devices make the IoT scalable and adaptable. From food production, finance, healthcare, manufacturing to energy, limitless industries have adopted IoT. Likewise, it has even revolutionized the IIoT (Industrial Internet of Things), buildings, smart homes, cities, and more.&lt;br&gt;
However, such advancement in IoT is also becoming the prime target for a cyber attacker, and it's among the trending topics in cyber security that no one should not ignore. Therefore, if you're a cybersecurity professional looking to enhance your skills, IoT security can benefit your career growth. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Automation&lt;br&gt;
Put simply, automation is one of the technology terms where human interaction is minimal. It includes IT automation, personal application like home automation, BPA (Business Process Automation), and more. &lt;br&gt;
Various types of automation tools are available like machine learning, AI (Artificial Intelligence), RPA (Robotic Process Automation). Therefore, it's recommended that you focus on learning how to keep your organization secure from automated attacks because it's used widely and is one of the emerging trends in cybersecurity. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Cloud Services &lt;br&gt;
In recent times cloud services have seen dramatic growth. As a result, many small to big companies have adopted cloud services. It allows users to access data storage, software applications, and other services directly through an internet connection instead of installing and relying on physical infrastructure. &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Using such technology comes with the benefits like increased performance and reduced operation cost. Unfortunately, though it's beneficial for the company, it also garners the attention of cybercriminals and often becomes the target of cyberattacks. &lt;/p&gt;

&lt;p&gt;For instance, if the systems aren't configured or maintained correctly, it's likely attackers will be able to exploit vulnerabilities of the system's security and get access to the company's critical data. &lt;/p&gt;

&lt;p&gt;Therefore, as a cybersecurity professional, we recommend that you stay aware of keeping cloud services secure. In addition, it'll help boost your career because many organizations even offer jobs for securing their cloud infrastructure.&lt;/p&gt;

&lt;p&gt;Wrapping Up&lt;br&gt;
The company must maintain the balance between user experience, &lt;br&gt;
privacy, and security. Because, in this technologically driven world, businesses getting attacked and becoming the &lt;a href="https://websitesecuritystore.com/blog/14-cyber-attacks-that-poses-threat-to-business/"&gt;victim of cyberattacks&lt;/a&gt; is quite common. &lt;/p&gt;

&lt;p&gt;Nonetheless, here we've our recommendation regarding emerging trends in cyber security and how you as a cybersecurity professional can have your edge on it to improve Internet privacy and IT security. &lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>webdev</category>
      <category>security</category>
    </item>
    <item>
      <title>Email Encryption: What it is, How Does It Work, and How to Encrypt an Email</title>
      <dc:creator>sampatellive</dc:creator>
      <pubDate>Tue, 09 Mar 2021 10:57:08 +0000</pubDate>
      <link>https://dev.to/sampatellive/email-encryption-what-it-is-how-does-it-work-and-how-to-encrypt-an-email-2j5k</link>
      <guid>https://dev.to/sampatellive/email-encryption-what-it-is-how-does-it-work-and-how-to-encrypt-an-email-2j5k</guid>
      <description>&lt;h1&gt;
  
  
  How can you be sure your email contents are safe, and no one is eavesdropping on them? Let's find out how to secure the communication using email encryption
&lt;/h1&gt;

&lt;p&gt;"What if someone reads my emails?", "What if someone steals that information and blackmails me?", "What if hackers alter the information in my emails or insert the malware in the attachments?" Let's be honest; at some point in our lives, these types of questions do haunt us all. Email confidentiality has been a talk-of-the-town as we hear data breach incidents so frequently. To tackle these issues, email providers and some independent third parties have come up with the idea of email encryption. In this article, we will talk about how email encryption works and what are some of the latest encryption tools and technologies available in the cybersecurity industry. &lt;/p&gt;

&lt;h1&gt;
  
  
  What is Email Encryption?
&lt;/h1&gt;

&lt;p&gt;Before moving forward, let’s quickly cover what &lt;a href="https://us.norton.com/internetsecurity-privacy-what-is-encryption.html"&gt;encryption&lt;/a&gt; is. Encryption means scrambling plaintext data and make it incomprehensible by applying mathematical algorithms. So, for example, if you encrypt the line “Angry-birds is my favorite game”, it will look something like this “ZJSwbngQXQvvkDPO5qCF0eyUoojqeOcXC0lIncuECKY=”. That means, even if someone gets access to your data, they won’t be able to read it. To decrypt and interpret the encrypted data, one needs to have an authentication key, and it is assumed that (ideality) the only authorized person has this key. Popular authentication keys are passwords, private keys (stored in digital certificates), OTP, passcodes, biometrics, etc. &lt;br&gt;
Encryption is used to protect many types of data such as data stored on cloud platforms, files and folders, data traveling between the website and its users, data stored on hardware devices, etc. And it is used to protect email communication as well. &lt;/p&gt;

&lt;p&gt;Historically, emails used to be in plaintext when they were in-transit and at-rest. That means, if an intruder hacks the email client or breaks-into an internet connection, they can read, steal, and modify the email content. But then, the &lt;a href="https://www.csoonline.com/article/3246212/what-is-ssl-tls-and-how-this-encryption-protocol-works.html"&gt;transport layer security&lt;/a&gt; (TLS) technology got invented which facilitated data encryption between two end-points. It got popular for all types of websites and email clients. Most email clients use it to provide email encryption facilities to their users. That means, when you send an email, it automatically gets encrypted until it reaches the intended recipients. Even if a hacker tries to access the email content, all they would get is a ciphertext that looks gibberish and doesn't make any sense! Later on, &lt;a href="https://searchsecurity.techtarget.com/definition/end-to-end-encryption-E2EE"&gt;end-to-end encryption&lt;/a&gt; got invented, which provides even tighter security than the TLS. In the next section, we have covered both of these technologies in detail.&lt;/p&gt;

&lt;h2&gt;
  
  
  How Does Email Encryption Work and How to Send Encrypted Emails?
&lt;/h2&gt;

&lt;p&gt;In this section, we have covered email encryption’s practical utility. As we mentioned earlier, there are basically main two types of email encryption. One is transport layer security (TLS) encryption, and another is end-to-end encryption (E2E). &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1) Transport Layer Email Encryption&lt;/strong&gt;&lt;br&gt;
In this type of email encryption, when you send an email, it reaches the email client's server first and then goes to the intended recipient. In easy words, when Bob sends an email to Alice using Gmail, it reaches Gmail's server first, and then (from that Gmail's server) it is pushed forward to Alice's email client. &lt;/p&gt;

&lt;h2&gt;
  
  
  How can I send an encrypted email using transport layer email encryption?
&lt;/h2&gt;

&lt;p&gt;The good news is you don’t have to anything to encrypt the email with TLS technology! All the email clients use SSL/TLS certificates. This certificate facilitates email encryption for all outgoing and incoming emails. Whenever you send an email, it automatically gets encrypted, and you don’t need to take any extra steps to encrypt or decrypt the email. &lt;br&gt;
If you open an email client, check the address bar. Can you see a padlock sign in front of the domain name? It is the sign that your email client is using an SSL/TLS certificate and is already providing you the email encryption facility.&lt;/p&gt;

&lt;p&gt;The biggest disadvantage of transport layer email encryption is that the email client stores the cryptographical keys on its server. If their employees want, they can read all of your email contents (although there are legal regulations for this). If a hacker breaks into the email client's server or accesses their database, they can also access all the email communication. Plus, TLS technology encrypts the emails only when they are in transit. But when they are at-rest i.e., stored on the email client, they remain in the plain text. That means, although hackers can’t read the emails while they are in transit, as soon as the email reaches the recipient and is stored on their email client, it becomes vulnerable for hackers to attack. &lt;/p&gt;

&lt;p&gt;Of course, all email clients have a strong security posture to prevent such cyberattacks. But the question is, can you take a proactive step to protect your email communication instead of just relying upon the email clients? This question is leading to our second type of email encryption, i.e., end-to-end encryption.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2) End-to-End Email Encryption&lt;/strong&gt; &lt;br&gt;
Unlike TLS encryption, in which there is the email client’s server works as the mediator, end-to-end encryption has a direct path of communication. When you send an email, it directly reaches the recipient without any intermediaries. That means, chances of email getting compromised, and corrupted get reduced dramatically. &lt;/p&gt;

&lt;h2&gt;
  
  
  How can I send encrypted email with end-to-end email encryption?
&lt;/h2&gt;

&lt;p&gt;There are some third-party certificates, browser extensions, and email clients which you can utilize to enable E2E encryption. &lt;/p&gt;

&lt;p&gt;Secure/Multipurpose Internet Mail Extensions (S/MIME) Certificates &lt;/p&gt;

&lt;p&gt;The organization needs to buy these certificates from the third-party certificate authorities (CAs). &lt;a href="https://cheapsslsecurity.com/blog/what-is-s-mime-what-it-is-why-you-need-it/"&gt;S/MIME certificates&lt;/a&gt; are also known as email signing certificates and email encryption certificates. The CAs vet the buying organization’s credentials to make sure it is issuing the certificate to the legit business. Once the S/MIME certificate is issued, you (as an organization) need to install it on your employees’ email clients. Please note that these certificates are available at the enterprise level only. So, if you are an individual, you can’t enable E2E encryption using S/MIME certificates unless your organization facilitates it.&lt;/p&gt;

&lt;p&gt;These certificates offer not only end-to-end encryption service but also identity authentication facilities and email tampering alerts. That means, the sender can insert the digital signature on the email so that the recipients can make sure the email is coming from the same source as it claims to be. No one can remove, copy, or modify this digital signature. It also uses hashing technology. So, if an intruder tries to modify the email content, the recipients are immediately notified that the email is compromised and not to trust its content and download anything from it.  These facilities are some of the best weapons to protect recipients from phishing emails. Plus, emails stay encrypted when they are at-rest (stored on the email clients), too. &lt;/p&gt;

&lt;p&gt;These are some of the resources with detailed steps on how to send encrypted email using S/MIME. You can follow these steps only after your organization has bought the email signing certificate. &lt;/p&gt;

&lt;h2&gt;
  
  
  How to enable S/MIME on
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://support.google.com/a/answer/6374496?hl=en#zippy=%2Cstep-enable-hosted-smime"&gt;Gmail&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/office/encrypt-messages-by-using-s-mime-in-outlook-web-app-2e57e4bd-4cc2-4531-9a39-426e7c873e26?ui=en-us&amp;amp;rs=en-us&amp;amp;ad=us"&gt;Outlook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://finance.yahoo.com/news/stop-using-common-email-encryption-084949788.html"&gt;Yahoo Mail&lt;/a&gt; (S/MIME protocol is not built-in in Yahoo. But you can install them using third-party applications). &lt;/li&gt;
&lt;li&gt;&lt;a href="https://support.apple.com/en-us/HT202345"&gt;iPhone&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://itsecurity.uiowa.edu/resources/macClientCert"&gt;Mac Devices&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Web clients that facilitate end-to-end encryption
&lt;/h3&gt;

&lt;p&gt;There are some email clients like ProtonMail, Tuanota, Mailfence, PreVeil, Virtru, etc, that have in-built E2E encryption facilities, without the need for a certificate. &lt;/p&gt;

&lt;h3&gt;
  
  
  Browser extensions for end-to-end email encryption
&lt;/h3&gt;

&lt;p&gt;You simply need to add extensions to your browsers and enable them on your regular email clients. Some of the popular extensions are &lt;a href="https://www.mailvelope.com/en"&gt;Mailvelope&lt;/a&gt;, &lt;a href="https://chrome.google.com/webstore/detail/sendsafely-encryption-for/glpichgelkekjnccdflklcclhnoioblm?hl=en-US"&gt;SendSafely&lt;/a&gt;, &lt;a href="https://opensource.google/projects/end-to-end"&gt;End-To-End&lt;/a&gt;, &lt;a href="https://chrome.google.com/webstore/detail/lockmagic-gmail-extension/gmginoamabjegaokkopplmenagbgdojn?hl=en-US"&gt;Lockmagic&lt;/a&gt;, and  &lt;a href="https://chrome.google.com/webstore/detail/flowcrypt-encrypt-gmail-w/bnjglocicdkmhmoohhfkfkbbkejdhdgc?hl=en"&gt;FlowCrypt&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>email</category>
      <category>encryption</category>
      <category>encrypt</category>
      <category>security</category>
    </item>
  </channel>
</rss>
