• Home
  • Short essays
    • Cybersecurity
    • Leadership
  • About
    • Adarsh Khare
    • Short essays on cybersecurity

Adarsh Khare's Blog

Adarsh Khare's Blog

Author Archives: adarshkhare

Digital Identity – How can we put control in the hands of the identity owner?

April 17, 2023

Can self-sovereign identity use blockchain technology to give the control of the identity in hands of the identity owner? This post discusses the overview of the SSI concept.

Continue reading →

Decision making – Your choices drive your direction

January 22, 2023

The way choices are presented can greatly influence the decisions we make.

Continue reading →

Ransomware protection – preparation tips for prevention and incident response

December 4, 2022

It is unfortunate that many critical institutions are not prepared to handle the increasing threat of ransomware attacks. Here are few basic tips to prepare for prevention as well as for incident response.

Continue reading →

Decision Making – You understand the past doesn’t mean you can predict the future

October 20, 2022

Overconfidence is our belief that we know more than what we actually know. Limited experience can build confidence even in an unpredictable environment that is filled with noisy signals.

Continue reading →

In pursuit of the perfect Authenticator

September 3, 2022

Reliably verifying claimed Identity in digital world is hard. This post discusses evolution of authenticator and why it is hard to build a perfect authenticator.

Continue reading →

Security of public-key cryptography and hard computational problem

July 16, 2022

what brings the confidence in security of asymmetric key cryptography? How are we sure that someone knowing the public key can’t determine the corresponding private key? The security relies on three well known hard computational problems.

Continue reading →

Decision making – Intuition gives confidence, but not a predictor of accuracy

April 27, 2022

Kahneman defines intuition as thinking that you know without knowing why you do. That means decision by intuition can often lead to biased decision.

Continue reading →

Authentication – How do I know you are the one who you claim?

April 24, 2022

This post is from my series of short essays on cybersecurity. Cybersecurity journey starts by putting the correct level of …

Continue reading →

Technical debt is not bad when cost of debt is balanced with value creation

February 19, 2022

Any software project whether it is a new application or a mature product, you must have heard the commonly used …

Continue reading →

Laying the cornerstone to “protect” the castle

January 9, 2022

This post is from my series of short essays on cybersecurity. One of the important activities in NIST-CSF is “protect”. …

Continue reading →

Digital signature – you can’t deny you authorized it

December 23, 2021

This post is from my series of short essays on cybersecurity. In the last post – Message Authentication Code (MAC) …

Continue reading →

Message Authentication Code (MAC) – Assurance against message tampering

December 5, 2021

This post is from my series of short essays on cybersecurity. In my last post Cryptography – The game of …

Continue reading →

← Older posts

All blog posts are my personal expressions, the opinions are not related to any of my current or previous employers.

Categories

Authentication Book Summary Cryptography Cybersecurity Cybersecurity Framework Leadership Security Controls Software Engineering Strategy Symmetric key cryptography

Top Posts

  • Digital Identity - How can we put control in the hands of the identity owner?
  • Decision making - Your choices drive your direction
  • Ransomware protection - preparation tips for prevention and incident response
  • Decision Making - You understand the past doesn’t mean you can predict the future
  • In pursuit of the perfect Authenticator

Recent Posts

  • Digital Identity – How can we put control in the hands of the identity owner?
  • Decision making – Your choices drive your direction
  • Ransomware protection – preparation tips for prevention and incident response
  • Decision Making – You understand the past doesn’t mean you can predict the future
  • In pursuit of the perfect Authenticator
  • Security of public-key cryptography and hard computational problem
  • Decision making – Intuition gives confidence, but not a predictor of accuracy
  • Authentication – How do I know you are the one who you claim?
  • Technical debt is not bad when cost of debt is balanced with value creation
  • Laying the cornerstone to “protect” the castle

Adarsh on twitter

Tweets by khareadarsh

Hits

  • 7,957 hits

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 13 other subscribers

Website Built with WordPress.com.

  • Subscribe Subscribed
    • Adarsh Khare's Blog
    • Already have a WordPress.com account? Log in now.
    • Adarsh Khare's Blog
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...