<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Musings</title>
	<atom:link href="https://securitymusings.com/feed" rel="self" type="application/rss+xml" />
	<link>https://securitymusings.com/</link>
	<description>Rants and raves from Infosec gurus</description>
	<lastBuildDate>Sun, 08 May 2022 23:51:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://securitymusings.com/wp-content/uploads/2017/01/cropped-microphone-32x32.png</url>
	<title>Security Musings</title>
	<link>https://securitymusings.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>PIVPN with 2-Factor Authentication</title>
		<link>https://securitymusings.com/article/4556/pivpn-with-2-factor-authentication</link>
					<comments>https://securitymusings.com/article/4556/pivpn-with-2-factor-authentication#comments</comments>
		
		<dc:creator><![CDATA[Peter Hesse]]></dc:creator>
		<pubDate>Sun, 08 May 2022 05:42:52 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[minimum viable security]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[Tutorial Tuesday]]></category>
		<guid isPermaLink="false">https://securitymusings.com/?p=4556</guid>

					<description><![CDATA[<p>(Edited 5/8/2022 with some changes to make sure it works on Buster / other linux distributions with sec-linux. The new stuff is in purple.) It took me a while but I finally found someone that had solved this. I am linking the solution. However, typing in a password and following it up with the one-time-password (OTP) is *extremely* user unfriendly. Anything that is hard to do to make better security actually makes worse security. Instead my approach protects the private keys with a password, and you then only use the OTP as the user&#8217;s password each login. So, here is the process. Assuming you have&#160;pivpn&#160;already installed and working with an OpenVPN configuration. Install google authenticator on the pi: sudo apt-get install libpam-google-authenticator Edit[&#8230;]</p>
<p>The post <a href="https://securitymusings.com/article/4556/pivpn-with-2-factor-authentication">PIVPN with 2-Factor Authentication</a> appeared first on <a href="https://securitymusings.com">Security Musings</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>(Edited 5/8/2022 with some changes to make sure it works on Buster / other linux distributions with sec-linux. The new stuff is in <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-purple-color">purple</mark>.)</p>



<p>It took me a while but I finally found someone that had solved this. I am linking <a href="https://github.com/pivpn/pivpn/issues/50#issuecomment-284082054" target="_blank" rel="noreferrer noopener">the solution</a>. However, typing in a password and following it up with the one-time-password (OTP) is *extremely* user unfriendly. Anything that is hard to do to make better security actually makes worse security. Instead my approach protects the private keys with a password, and you then only use the OTP as the user&#8217;s password each login.</p>



<p>So, here is the process. Assuming you have&nbsp;<a href="https://www.pivpn.io/" target="_blank" rel="noreferrer noopener">pivpn</a>&nbsp;already installed and working with an OpenVPN configuration.</p>



<ol class="wp-block-list"><li>Install google authenticator on the pi: <code>sudo apt-get install libpam-google-authenticator</code></li><li>Edit your openvpn server configuration: <code>sudo nano /etc/openvpn/server.conf </code>and add <code>plugin /usr/lib/openvpn/openvpn-plugin-auth-pam.so openvpn</code> (to use google authenticator) and <code>reneg-sec 0</code> (to not reconnect every x minutes as the password changes every few seconds).<ul><li><strong>NOTE</strong>: This will make this server configuration only work with OTP. If you have accounts that will just be using passwords then you will need to have a separate server configuration and separate port for that. Info on how to do that is <a href="https://github.com/pivpn/pivpn/issues/178" target="_blank" rel="noreferrer noopener">here</a>.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-purple-color"><strong>NOTE 2</strong>: If you are on Buster, or some version of Linux where the openvpn-plugin-auth-pam.so is not in that location, you should link it into that location. For example in Buster, this would be the command you would run to create the appropriate link: <code>sudo ln -s /usr/lib/arm-linux-gnueabihf/openvpn/plugins/openvpn-plugin-auth-pam.so /usr/lib/openvpn/openvpn-plugin-auth-pam.so </code></mark></li></ul></li><li>Create a pam.d openvpn profile: <code>sudo cp /etc/pam.d/common-account /etc/pam.d/openvpn</code></li><li>Edit it <code>sudo nano /etc/pam.d/openvpn</code> to add this line at the end: <code>auth required pam_google_authenticator.so</code> </li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-purple-color">Newer versions of linux with sec-linux use a more strict sandboxing config in systemd which interferes with google-authenticator. To get past this, we will need to edit /lib/systemd/system/openvpn@.service and remove this line to make sure it can read the .google_authenticator files in the home directories of the accounts we create:<br><code>ProtectHome=true</code></mark></li><li>Now run <code>sudo service openvpn</code> restart to reload the configuration change.</li></ol>



<p>Now, create your user. For this to work you will use system accounts (accounts you use to log to your raspberry like &#8216;pi&#8217;). You can create as many account as you with the&nbsp;<code>sudo adduser&nbsp;<em>username</em></code><em>&nbsp;</em>command. The user&#8217;s password really doesn&#8217;t matter. Once you&#8217;ve created the user:</p>



<ol class="wp-block-list"><li>login as the user on the raspberry pi: <code>sudo su - <em>username</em></code> (replace <em>username </em>with the actual username)</li><li>run the <code>google-authenticator</code> command and follow the instructions (<em>save the barcode url for next step, or import it directly on the user&#8217;s device at that time</em>)</li><li>Type <code>exit </code>to get out of that user&#8217;s shell and return to your own. </li><li>Executing google-authenticator adds a file <code>.google_authenticator</code> in the user’s home directory. This file must have no rights except read for the user, so run <code>sudo chmod 400 /home/<em>username</em>/.google_authenticator</code> (change to the correct username)</li><li>create a pivpn account with the exact same name as the user : <code>pivpn -a</code> Note: the username must be the same than the system account. (<em>The original directions suggest doing this with no password; It is safer to use a password to protect the private key. The password used here will need to be communicated safely to the user</em>)</li><li>edit the freshly created <em>username</em>.ovpn file and add the lines <code>auth-user-pass</code> (to tell the client to request username and password on connection) and <code>reneg-sec 0</code> (to not reconnect every x minutes as the password changes every few seconds) <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-purple-color">And comment out the <code>auth-nocache</code> line by putting a # at the front of it. (This will keep the connection from re-negotiating every 60 minutes which is not good for an always-on VPN.)</mark></li></ol>



<p>Now, just install your .OVPN file on your client. (You can save the private key password if your client supports it, or require prompting for it every time.) Use the barcode URL generated earlier to show the QR Code for import into your authenticator app on your mobile device, and profit!&nbsp;<br>Login with the same username and the OTP as the password. (The private key password being the one used when you created the account with the <code>pivpn -a</code> command.) You&#8217;re now using multifactor authentication!. Something you know (the private key password) and something you have (your authenticator app which is a one-time-password generator).</p>
<p>The post <a href="https://securitymusings.com/article/4556/pivpn-with-2-factor-authentication">PIVPN with 2-Factor Authentication</a> appeared first on <a href="https://securitymusings.com">Security Musings</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://securitymusings.com/article/4556/pivpn-with-2-factor-authentication/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>OWASP Top 10 in 10 Minutes</title>
		<link>https://securitymusings.com/article/4576/owasp-top-10-in-10-minutes</link>
		
		<dc:creator><![CDATA[Peter Hesse]]></dc:creator>
		<pubDate>Mon, 04 Apr 2022 23:22:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://securitymusings.com/?p=4576</guid>

					<description><![CDATA[<p>I have updated my talk that I&#8217;ve given internally at our company a number of times to reflect the 2021 version of OWASP Top 10&#8230; Normally I can give the whole talk in 10 minutes, but this was presented in Costa Rica, and I really slowed it down. Enjoy!</p>
<p>The post <a href="https://securitymusings.com/article/4576/owasp-top-10-in-10-minutes">OWASP Top 10 in 10 Minutes</a> appeared first on <a href="https://securitymusings.com">Security Musings</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>I have updated my talk that I&#8217;ve given internally at our company a number of times to reflect the 2021 version of OWASP Top 10&#8230; Normally I can give the whole talk in 10 minutes, but this was presented in Costa Rica, and I really slowed it down. Enjoy!</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="Webinar: OWASP Top 10 in 10 Minutes Part 1 – What are we talking about?" width="700" height="394" src="https://www.youtube.com/embed/ifS6gl3K2c4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
</div></figure>
<p>The post <a href="https://securitymusings.com/article/4576/owasp-top-10-in-10-minutes">OWASP Top 10 in 10 Minutes</a> appeared first on <a href="https://securitymusings.com">Security Musings</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Usability vs Security</title>
		<link>https://securitymusings.com/article/4573/usability-vs-security</link>
		
		<dc:creator><![CDATA[Peter Hesse]]></dc:creator>
		<pubDate>Sat, 26 Feb 2022 12:10:00 +0000</pubDate>
				<category><![CDATA[software]]></category>
		<guid isPermaLink="false">https://securitymusings.com/?p=4573</guid>

					<description><![CDATA[<p>(This post originally appeared on the Cyber Tech Accord&#8217;s signatory blog: https://cybertechaccord.org/usability-vs-security-the-myth-that-keeps-cisos-up-at-night/) As I write this, we are halfway through the fifth month of the COVID-19 pandemic. All of us have had some amount of upheaval in our lives including restricting travel and our contact with friends and family. Some have had even more difficulty – loss of jobs, businesses, and the downturn of entire economic sectors. An uncertain future remains before us.&#160; The rapid move by many businesses to support teleworking has caused a boom in technology fields. Some organizations like Amazon, Twitter, Teledoc, and Siemens are treating working remotely as not just a temporary change, but as a more permanent shift. Tech adoption, disruption, and digital transformation are[&#8230;]</p>
<p>The post <a href="https://securitymusings.com/article/4573/usability-vs-security">Usability vs Security</a> appeared first on <a href="https://securitymusings.com">Security Musings</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>(This post originally appeared on the Cyber Tech Accord&#8217;s signatory blog: <a href="https://cybertechaccord.org/usability-vs-security-the-myth-that-keeps-cisos-up-at-night/">https://cybertechaccord.org/usability-vs-security-the-myth-that-keeps-cisos-up-at-night/</a>)</p>



<p>As I write this, we are halfway through the fifth month of the COVID-19 pandemic. All of us have had some amount of upheaval in our lives including restricting travel and our contact with friends and family. Some have had even more difficulty – loss of jobs, businesses, and the downturn of entire economic sectors. An uncertain future remains before us.&nbsp;</p>



<p>The rapid move by many businesses to support teleworking has caused a boom in technology fields. Some organizations like Amazon, Twitter, Teledoc, and Siemens are treating working remotely as not just a temporary change, but as a more permanent shift. Tech adoption, disruption, and digital transformation are all on the rise. As a result, the CISOs that are lucky enough to remain employed are facing a greater challenge than before. Do more with less. Move from the tactical (implement this tool, remediate this vulnerability) to the strategic. Tackle the challenges of not just working remotely but onboarding new hires and creating team camaraderie remotely. And do not let this turbulence affect the security of your organization.</p>



<p><strong>The False Tradeoff</strong></p>



<p>Everyone is navigating uncertainty, and CISOs are being asked to quickly implement or approve new technology solutions to simplify working from home. They are asked to sign off on a new tool that will make sharing information easier—but find that the solution doesn’t have even the most basic security principles in place.</p>



<p>“There’s a tradeoff between security and usability,” someone will inevitably say.</p>



<p>People believe that there must be a compromise between how easy something is to use, and how secure it can be. This simply isn’t the case. In fact, the best security measures should allow for seamless protection while enhancing user experience.</p>



<p>Look at the rise of new online ordering systems that have taken off to enable small restaurants to survive the shift to take-out only. Many of these do not require a complicated signup or registration process at all. Instead, they leverage your email or phone number as an identifier, and a browser cookie to remember you between visits. There is no log in with a username and password, just a link by text or email.</p>



<p>These solutions focus on improving the online ordering experience without compromising on security. They use HTTPS to protect transactions, secure their browser cookies, and don’t even save your whole credit card number. The only risk if your email or SIM is compromised is your order history! It’s ok with me if someone can crack my Gmail that they will find out I love my local restaurant’s Pad Thai.</p>



<p><strong>Apply Design Thinking Principles</strong></p>



<p>In these times of volatility and uncertainty, it is important realize that everyone is facing the same challenges, and some are having a tougher time than others. There is already so much change going on in everyone’s lives, and introducing new security controls or solutions may be met with more resistance than usual.</p>



<p>This is actually a great opportunity for security leaders to leverage human-centric design thinking principles.</p>



<p>Start by empathizing with your user community to find their pain points and get their feedback. Ask questions. See how it impacts their day-to-day process.</p>



<p>In uncertain times like these, you shouldn’t expect individuals to be willing to accept holistic changes. You need to prioritize the most important goals, and clearly define them. This may slow you down – but a little patience will go a long way to ensure that the solution will be embraced, and not something to “work around”.</p>



<p>And of course, you will need to test and iterate. Roll out your solution to small groups. Get their feedback, improve, and test again. Ensure the solution works for everyone. Value everyone’s feedback – not only executives and the security team.</p>



<p><strong>Make it Easy to do the Right Thing</strong></p>



<p>User experience (UX) professionals use a method called “choice architecture” to carefully design the way a choice is presented. People’s decisions can be influenced based on the context of the choices provided. For example, bolding or outlining a button that should be the default choice.</p>



<p>By working together with UX teams, you can make it easier for users to make the safe choice.</p>



<p>Let’s take the example of a tablet-based system to view medical records. Replacing the clipboard at the end of a hospital bed, it allows the nurse or doctor to view medical history, recent vitals, allergies, and other important medical information. It must be very easy for a nurse or doctor to view key information quickly – perhaps without even logging in. In an emergency, quick access to this information could make the difference between life and death for the patient.</p>



<p>However, if you wanted to use the same tool to view the information of a different patient, it should be more difficult. Perhaps you should have to log in, go through a menu, confirm that you will erase the current record, search for a new record, and confirm you want it to be available in emergency situations. Where the original use case involved only one tap, in this case we use choice architecture and to make it more difficult to make a more risky choice.</p>



<p><strong>Work Together</strong></p>



<p>Too often, efforts to create or adopt new technology either ignore security or usability until too late in the process. Security is asked to approve a new product which has already been purchased, or security tools are rolled out to the whole company without any user feedback.</p>



<p>By working as one team, UX/UI designers, user researchers, and security professionals can create a customer experience that helps and encourages users to make better security choices.&nbsp;</p>



<p>The notion that security and usability are a tradeoff is a false premise. Coordinating the two disciplines is the key – and leading technology companies that embrace this co-creation process are seeing quicker adoption of their solutions.</p>
<p>The post <a href="https://securitymusings.com/article/4573/usability-vs-security">Usability vs Security</a> appeared first on <a href="https://securitymusings.com">Security Musings</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Encryption Isn&#8217;t A Debate</title>
		<link>https://securitymusings.com/article/4551/encryption-isnt-a-debate</link>
		
		<dc:creator><![CDATA[Peter Hesse]]></dc:creator>
		<pubDate>Wed, 13 Jan 2021 15:04:33 +0000</pubDate>
				<category><![CDATA[rants]]></category>
		<category><![CDATA[regulations]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://securitymusings.com/?p=4551</guid>

					<description><![CDATA[<p>While I&#8217;m glad to see the use of Signal on the rise, I am afraid that current events will cause the &#8220;government should have access into all encryption&#8221; debate to come up again, and people may think it&#8217;s a good idea out of fear. It&#8217;s not. Here&#8217;s why: As the global pandemic has kept everyone at home, our interaction with everything and everyone has increasingly had more of a digital footprint than ever before. That digital footprint without encryption exposes a lot of information. Encryption is needed due to the way the Internet works. The Internet is a loose confederation of companies, educational institutions, and telecommunication providers. Everything passes through networks owned by others. Without encryption, any party along the[&#8230;]</p>
<p>The post <a href="https://securitymusings.com/article/4551/encryption-isnt-a-debate">Encryption Isn&#8217;t A Debate</a> appeared first on <a href="https://securitymusings.com">Security Musings</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>While I&#8217;m glad to see the use of <a href="https://signal.org/" target="_blank" rel="noreferrer noopener">Signal</a> on the rise, I am afraid that current events will cause the &#8220;government should have access into all encryption&#8221; debate to come up again, and people may think it&#8217;s a good idea out of fear. It&#8217;s not. Here&#8217;s why:</p>



<p>As the global pandemic has kept everyone at home, our interaction with everything and everyone has increasingly had more of a digital footprint than ever before. That digital footprint without encryption exposes a lot of information.</p>



<p>Encryption is needed due to the way the Internet works. The Internet is a loose confederation of companies, educational institutions, and telecommunication providers. Everything passes through networks owned by others.</p>



<p>Without encryption, any party along the way can see what you&#8217;re doing. What web pages you&#8217;re visiting. Contents of your email. Your instant messages and texts. It&#8217;s all visible, trackable, traceable.</p>



<p>Encryption is the basis for our only chance of privacy online. Whether it&#8217;s privacy from your stalker ex, from retailers, advertisers, or the government &#8211; the only thing that keeps others from seeing everything you do online is encryption.</p>



<p>People deserve to not have their every online move scrutinized, analyzed, and archived forever. Everyone should have the right to be able to interact in the digital world without fear. The <em>only</em> way to enable this is through encryption.</p>



<p>But, you say, if you&#8217;re not doing anything illegal, what is the harm in the government being able to access things that are encrypted? I&#8217;ll give you three simple reasons.</p>



<p>1) Encryption that can be bypassed by any third party must be fundamentally weakened. When I started in this field, DES encryption was common &#8211; which can now be cracked in seconds on a smartphone. Anything that weakens encryption must be avoided.</p>



<p>2) The US government&#8217;s own security is so bad (see: SolarWinds, Shadow Brokers, OPM breaches) that eventually whatever backdoor they have access to will eventually make it out of the government&#8217;s hands and into the hands of enemies.</p>



<p>3) Encryption that can be bypassed by the government will eventually be abused. We have already seen the US create illegal mass surveillance capabilities, and this capability will just agencies give carte blanche to do it again.</p>



<p>So &#8211; when the debate around &#8220;government should be able to view all encrypted internet traffic to keep us safe&#8221; starts up again &#8211; educate your representatives on why it&#8217;s a bad idea for all of us. Get them to commit to voting against it.</p>



<p>Ben Franklin&#8217;s quote rings out: &#8220;Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety.&#8221; Encryption is the key to the liberty of privacy online. Do not give it up in the false hope of safety.</p>
<p>The post <a href="https://securitymusings.com/article/4551/encryption-isnt-a-debate">Encryption Isn&#8217;t A Debate</a> appeared first on <a href="https://securitymusings.com">Security Musings</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Required Maintenance</title>
		<link>https://securitymusings.com/article/4548/required-maintenance</link>
		
		<dc:creator><![CDATA[Peter Hesse]]></dc:creator>
		<pubDate>Wed, 12 Feb 2020 01:57:00 +0000</pubDate>
				<category><![CDATA[linkedin]]></category>
		<category><![CDATA[rants]]></category>
		<guid isPermaLink="false">https://securitymusings.com/?p=4548</guid>

					<description><![CDATA[<p>What is the misunderstood, unloved, and overly complicated security technology that underpins most modern digital solutions? #PKI. Public Key Infrastructure. It&#8217;s where my career in security began. Digital&#160;#certificates&#160;protect so many things we use. From this website you&#8217;re visiting (check the &#x1f512; icon on your address bar to be sure), to your ability to use your LinkedIn login to federate to other sites, to the authenticity of the patch just applied to update your browser&#8230; And it&#8217;s just scratching the surface. PKI has gone from&#160;#security&#160;technology to&#160;#infrastructure. And if you are a user of Microsoft Teams, today you may have seen a failure of that infrastructure. Microsoft Teams, like many modern solutions, has a separate front-end and back-end, connected through an&#160;#API. And[&#8230;]</p>
<p>The post <a href="https://securitymusings.com/article/4548/required-maintenance">Required Maintenance</a> appeared first on <a href="https://securitymusings.com">Security Musings</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>What is the misunderstood, unloved, and overly complicated security technology that underpins most modern digital solutions?</p>



<p><a href="https://www.linkedin.com/feed/hashtag/?keywords=pki&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6630221399925551104">#PKI</a>. Public Key Infrastructure. It&#8217;s where my career in security began.</p>



<p>Digital&nbsp;<a href="https://www.linkedin.com/feed/hashtag/?keywords=certificates&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6630221399925551104">#certificates</a>&nbsp;protect so many things we use. From this website you&#8217;re visiting (check the <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f512.png" alt="🔒" class="wp-smiley" style="height: 1em; max-height: 1em;" /> icon on your address bar to be sure), to your ability to use your LinkedIn login to federate to other sites, to the authenticity of the patch just applied to update your browser&#8230; And it&#8217;s just scratching the surface.</p>



<p>PKI has gone from&nbsp;<a href="https://www.linkedin.com/feed/hashtag/?keywords=security&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6630221399925551104">#security</a>&nbsp;technology to&nbsp;<a href="https://www.linkedin.com/feed/hashtag/?keywords=infrastructure&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6630221399925551104">#infrastructure</a>. And if you are a user of Microsoft Teams, today you may have seen a failure of that infrastructure.</p>



<p>Microsoft Teams, like many modern solutions, has a separate front-end and back-end, connected through an&nbsp;<a href="https://www.linkedin.com/feed/hashtag/?keywords=api&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6630221399925551104">#API</a>. And communicating over this API requires a valid PKI certificate.</p>



<p>Unfortunately, Microsoft allowed this certificate to expire, which meant that the back-end didn&#8217;t trust the front-end any longer. And you couldn&#8217;t chat with your team.</p>



<p>All infrastructure needs regular checks and maintenance, and PKI is no different.</p>
<p>The post <a href="https://securitymusings.com/article/4548/required-maintenance">Required Maintenance</a> appeared first on <a href="https://securitymusings.com">Security Musings</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Karachi</title>
		<link>https://securitymusings.com/article/4545/karachi</link>
		
		<dc:creator><![CDATA[Peter Hesse]]></dc:creator>
		<pubDate>Wed, 05 Feb 2020 01:55:00 +0000</pubDate>
				<category><![CDATA[linkedin]]></category>
		<guid isPermaLink="false">https://securitymusings.com/?p=4545</guid>

					<description><![CDATA[<p>Today, at a&#160;10Pearls&#160;company event, I was asked a question: &#8220;What has been your biggest failure or mistake, and what did you learn from it?&#8221; Both&#160;Ghazanfar Ghori&#160;and I agreed that failure represents permanence. Anything that seemed like a failure at the time becomes a learning opportunity and a chance to do better next time. So instead, I shared a mistake. And my mistake was not coming to visit Karachi sooner! It has been an absolute pleasure getting to learn more about our team and the culture here. You can see my smile in this picture, as I&#8217;m hanging on to the front of a rickshaw as we traveled the city! #pakistan#tech</p>
<p>The post <a href="https://securitymusings.com/article/4545/karachi">Karachi</a> appeared first on <a href="https://securitymusings.com">Security Musings</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Today, at a&nbsp;<a href="https://www.linkedin.com/company/10pearls/">10Pearls</a>&nbsp;company event, I was asked a question: &#8220;What has been your biggest failure or mistake, and what did you learn from it?&#8221;</p>



<p>Both&nbsp;<a href="https://www.linkedin.com/in/ghazanfarghori">Ghazanfar Ghori</a>&nbsp;and I agreed that failure represents permanence. Anything that seemed like a failure at the time becomes a learning opportunity and a chance to do better next time.</p>



<p>So instead, I shared a mistake.</p>



<p>And my mistake was not coming to visit Karachi sooner!</p>



<p>It has been an absolute pleasure getting to learn more about our team and the culture here.</p>



<p>You can see my smile in this picture, as I&#8217;m hanging on to the front of a rickshaw as we traveled the city!</p>



<p><a href="https://www.linkedin.com/feed/hashtag/?keywords=pakistan&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6627541524240494592">#pakistan</a><a href="https://www.linkedin.com/feed/hashtag/?keywords=tech&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6627541524240494592">#tech</a></p>
<p>The post <a href="https://securitymusings.com/article/4545/karachi">Karachi</a> appeared first on <a href="https://securitymusings.com">Security Musings</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
