
{"id":2500,"date":"2013-06-21T00:00:00","date_gmt":"2013-06-21T00:00:00","guid":{"rendered":"http:\/\/otava.test\/encryption-at-the-software-level-its-not-always-cut-and-dry\/"},"modified":"2013-06-21T00:00:00","modified_gmt":"2013-06-21T00:00:00","slug":"encryption-at-the-software-level-its-not-always-cut-and-dry","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/","title":{"rendered":"Encryption at the Software Level: \u2018It\u2019s Not Always Cut-and-Dry\u2019"},"content":{"rendered":"<p>Encryption is a hot topic at Online Tech during the month of June, and we hope we\u2019ve offered some valuable insight into the complex topic through our ongoing series of free educational <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">webinars<\/a>.<\/p>\n<p>The latest was presented by guest co-host Mark Stanislav, Security Evangelist at <a href=\"https:\/\/www.duosecurity.com\/\">Duo Security<\/a>, and our own Software Development Manager, Farooq Ahmed. Together, Stanislav (a Linux expert) and Ahmed (a .Net developer) tackled how encryption can be applied at various levels of the data-sharing process from the software application code in the webinar\u00a0<em><a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">Encryption at the Software Level: Linux and Windows<\/a>.<\/em><\/p>\n<p>\u201cThe topic of cryptography is very involved, very complex,\u201d Stanislav told attendees during the one-hour presentation on Tuesday, June 18. \u201cWhat we want to do is operationalize your knowledge so that you feel comfortable knowing what these terms mean, how to get started with some of these issues and \u2026 step beyond being the everyday, end-user type of consumer of cryptography.\u201d<\/p>\n<p>The webinar is a follow-up to <a href=\"https:\/\/onlinetech.com\/events\/encryption-perspective-on-privacy-security-a-compliance\">the June 11 presentation<\/a> on the value of encryption for <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA<\/a>, <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI<\/a> and other regulatory frameworks, and a precursor to a <a href=\"https:\/\/onlinetech.com\/events\/encryption-at-the-hardware-and-storage-level\">hardware and storage-focused webinar<\/a> scheduled for June 25.<\/p>\n<p>Stanislav said one goal of the webinar was to define \u201chow to employ and where to employ cryptology, because it\u2019s not always cut-and-dry in terms of when and where to use it.\u201d<\/p>\n<p>He outlined the differences between encryption and encoding, gave an in-depth comparison of symmetric key cryptography with asymmetric key cryptography and defined cryptographic hashing.<\/p>\n<p>\u201cThere\u2019s a lot of big math, a lot of very technical details, and some brilliant people that have put these algorithms together over the years,\u201d Stanislav said. \u201cBut when it comes down to it, we utilize this stuff every single day and it has really revolutionized how we do information security.\u201d<\/p>\n<p>Stanislav also outlined what he called the<strong> three most common cryptography misconceptions<\/strong>:<\/p>\n<ol>\n<li>Encryption algorithms need to be secret to be secure. <strong>False<\/strong>: Security should depend entirely on the key and not on security through obscurity.<\/li>\n<li>Public-key cryptography means that my data can be read by anyone with my public key. <strong>False<\/strong>: Public-key cryptography (asymmetric cryptography) allows for data to be encrypted with a public key and then only read using the private key.<\/li>\n<li>The government puts backdoors into all algorithms. <strong>False<\/strong>: If you can prove this, tell someone!<\/li>\n<\/ol>\n<p>To give the concept of effective software encryption a real-life feel, Stanislav and Ahmed worked through an example scenario. In it, they followed data for a hospital through its various connections and discussed the appropriate related encryption.<\/p>\n<p>Why, for instance, does Stanislav recommend a vendor connecting to the hospital through the internet via a virtual private network (VPN) still send patient data through an SSL website?<\/p>\n<p>Or why, once the uploaded file is encrypted to the hospital server, should the Windows application server pull the file via SFTP rather than FTP?<\/p>\n<p>And once the encrypted data is over to the web application server, what should continue to be encrypted, how should the hospital store that data long-term (encrypting data vs. encrypting databases) and how should the hospital interact with that data to keep it secure?<\/p>\n<p>All those questions, and more, were answered by our experts. To learn more, both the slides and a video replay of the webinar are available <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">here<\/a>.<\/p>\n<p>\u201cIt\u2019s good to think about the bigger picture of how we secure data,\u201d Stanislav said. \u201cThe reality is, levels of security in general have a certain scope of what it protects and how it protects. It\u2019s important to think about things bigger.\u201d<\/p>\n<p>Don&#8217;t miss the last encryption webinar in the series, next Tuesday at 2PM ET: <em><a href=\"https:\/\/www.onlinetech.com\/events\/encryption-at-the-hardware-and-storage-level\">Encryption at the Hardware and Storage Level<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Encryption is a hot topic at Online Tech during the month of June, and we hope we\u2019ve offered some valuable insight into the complex topic through our ongoing series of free educational webinars. The latest was presented by guest co-host Mark Stanislav, Security Evangelist at Duo Security, and our own Software Development Manager, Farooq Ahmed. Together, Stanislav (a Linux expert) and Ahmed (a .Net developer) tackled how encryption can be applied at various levels of the data-sharing process from the software application code in the webinar\u00a0Encryption at the Software Level: Linux and Windows. \u201cThe topic of cryptography is very involved, very complex,\u201d Stanislav told attendees during the one-hour presentation on Tuesday, June 18. \u201cWhat we want to do is operationalize your knowledge so that you feel comfortable knowing what these terms mean, how to get started with some of these issues and \u2026 step beyond being the everyday, end-user type of consumer of cryptography.\u201d The webinar is a follow-up to the June 11 presentation on the value of encryption for HIPAA, PCI and other regulatory frameworks, and a precursor to a hardware and storage-focused webinar scheduled for June 25. Stanislav said one goal of the webinar was to define \u201chow&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2500","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Encryption at the Software Level: \u2018It\u2019s Not Always Cut-and-Dry\u2019 | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encryption at the Software Level: \u2018It\u2019s Not Always Cut-and-Dry\u2019\" \/>\n<meta property=\"og:description\" content=\"Encryption is a hot topic at Online Tech during the month of June, and we hope we\u2019ve offered some valuable insight into the complex topic through our ongoing series of free educational webinars. The latest was presented by guest co-host Mark Stanislav, Security Evangelist at Duo Security, and our own Software Development Manager, Farooq Ahmed. Together, Stanislav (a Linux expert) and Ahmed (a .Net developer) tackled how encryption can be applied at various levels of the data-sharing process from the software application code in the webinar\u00a0Encryption at the Software Level: Linux and Windows. \u201cThe topic of cryptography is very involved, very complex,\u201d Stanislav told attendees during the one-hour presentation on Tuesday, June 18. \u201cWhat we want to do is operationalize your knowledge so that you feel comfortable knowing what these terms mean, how to get started with some of these issues and \u2026 step beyond being the everyday, end-user type of consumer of cryptography.\u201d The webinar is a follow-up to the June 11 presentation on the value of encryption for HIPAA, PCI and other regulatory frameworks, and a precursor to a hardware and storage-focused webinar scheduled for June 25. Stanislav said one goal of the webinar was to define \u201chow...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-21T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Encryption at the Software Level: \u2018It\u2019s Not Always Cut-and-Dry\u2019\",\"datePublished\":\"2013-06-21T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/\"},\"wordCount\":621,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/\",\"url\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/\",\"name\":\"Encryption at the Software Level: \u2018It\u2019s Not Always Cut-and-Dry\u2019 | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2013-06-21T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption at the Software Level: \u2018It\u2019s Not Always Cut-and-Dry\u2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encryption at the Software Level: \u2018It\u2019s Not Always Cut-and-Dry\u2019 | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/","og_locale":"en_US","og_type":"article","og_title":"Encryption at the Software Level: \u2018It\u2019s Not Always Cut-and-Dry\u2019","og_description":"Encryption is a hot topic at Online Tech during the month of June, and we hope we\u2019ve offered some valuable insight into the complex topic through our ongoing series of free educational webinars. The latest was presented by guest co-host Mark Stanislav, Security Evangelist at Duo Security, and our own Software Development Manager, Farooq Ahmed. Together, Stanislav (a Linux expert) and Ahmed (a .Net developer) tackled how encryption can be applied at various levels of the data-sharing process from the software application code in the webinar\u00a0Encryption at the Software Level: Linux and Windows. \u201cThe topic of cryptography is very involved, very complex,\u201d Stanislav told attendees during the one-hour presentation on Tuesday, June 18. \u201cWhat we want to do is operationalize your knowledge so that you feel comfortable knowing what these terms mean, how to get started with some of these issues and \u2026 step beyond being the everyday, end-user type of consumer of cryptography.\u201d The webinar is a follow-up to the June 11 presentation on the value of encryption for HIPAA, PCI and other regulatory frameworks, and a precursor to a hardware and storage-focused webinar scheduled for June 25. Stanislav said one goal of the webinar was to define \u201chow...","og_url":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/","og_site_name":"OTAVA","article_published_time":"2013-06-21T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Encryption at the Software Level: \u2018It\u2019s Not Always Cut-and-Dry\u2019","datePublished":"2013-06-21T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/"},"wordCount":621,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/","url":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/","name":"Encryption at the Software Level: \u2018It\u2019s Not Always Cut-and-Dry\u2019 | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2013-06-21T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Encryption at the Software Level: \u2018It\u2019s Not Always Cut-and-Dry\u2019"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2500"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2500\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2500"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2500"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2500"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}