Wondering if anyone’s ever defended against a hash function-based attack — can you share how you dealt with it, or any lessons learned from that?

165 views2 Comments
Sort By:
Oldest
Senior Director Engineering in Travel and Hospitalitya year ago
Though I cant share the details - we did leverage a third party security consultancy to help us through the process
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
Chief Information Security Officer in Healthcare and Biotecha year ago
Alien Vault - open threat exchange can be helpful. 
1

Content you might like

VP of IT in Retail3 days ago
My previous organization implemented a strict one-strike policy for lost or damaged devices. While the first incident was considered an accident, repeat offenders were required to reimburse the company for the lost or damaged ...read more
82 views1 Comment

No Increase16%

1-5% increase47%

6-25% increase24%

26-50% increase6%

51-75% increase1%

76%+1%

Other2%

View Results
1.7k views1 Upvote
IT Manager in Constructiona month ago
Hello,
the topic is so broad, what are you focused on?
Read More Comments
4.8k views2 Upvotes5 Comments
78 views

Yes - one person46%

Yes - multiple people46%

No7%

View Results
3.1k views