
Josh Lake
Specialist in Security, Privacy and Encryption
Josh Lake is a writer who focuses on the intersections between technology, privacy and security. His work helps companies and individuals get the most out of technological developments, without having to sacrifice their civil liberties or open themselves up to the ever-increasing threats of cybercrime.
Articles by Josh
Key derivation functions (KDFs) play a vital role in our security. They help us create strong keys, allow us to store passwords and more.
By Josh Lake
in Information Security
on September 12, 2023
Fernet makes it easy for Python developers to implement encryption and authentication into their applications.
By Josh Lake
in Information Security
on September 5, 2023
The CIA triad are three critical attributes for data security; confidentiality, integrity and availability.
By Josh Lake
in Information Security
on November 1, 2023
Single sign-on can make life easier for users and help to boost an organization's overall security. We reveal the pros and cons of single sign-on and whether you should use it.
By Josh Lake
in Information Security
on August 1, 2023
If a preimage attack is possible against the cryptographic hash functions we use, it could completely undermine our online security.
By Josh Lake
in Information Security
on October 27, 2023
Websites and apps use dark patterns to manipulate us into taking actions that we may not want to take. Find out how they violate our privacy.
By Josh Lake
in Information Security
on June 14, 2022
Collision attacks threaten the security of cryptographic hash functions, which form critical parts of our cybersecurity infrastructure. This article covers everything you should know about collision attacks.
By Josh Lake
in Information Security
on September 13, 2023
Password cracking is one of the tools that hackers turn to when they can't gain access to an account by other means. Find out how they do it.
By Josh Lake
in Information Security
on November 22, 2023
SHA-2 is a hash function that plays a critical role in much of our online security. Find out what it is, where it's used and how it works.
By Josh Lake
in Information Security
on February 17, 2022