
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Encryption at the Software Level: \u2018It\u2019s Not Always Cut-and-Dry\u2019","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Ql271yRqqr\"><a href=\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/\">Encryption at the Software Level: \u2018It\u2019s Not Always Cut-and-Dry\u2019<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-its-not-always-cut-and-dry\/embed\/#?secret=Ql271yRqqr\" width=\"600\" height=\"338\" title=\"&#8220;Encryption at the Software Level: \u2018It\u2019s Not Always Cut-and-Dry\u2019&#8221; &#8212; OTAVA\" data-secret=\"Ql271yRqqr\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Encryption is a hot topic at Online Tech during the month of June, and we hope we\u2019ve offered some valuable insight into the complex topic through our ongoing series of free educational webinars. The latest was presented by guest co-host Mark Stanislav, Security Evangelist at Duo Security, and our own Software Development Manager, Farooq Ahmed. Together, Stanislav (a Linux expert) and Ahmed (a .Net developer) tackled how encryption can be applied at various levels of the data-sharing process from the software application code in the webinar\u00a0Encryption at the Software Level: Linux and Windows. \u201cThe topic of cryptography is very involved, very complex,\u201d Stanislav told attendees during the one-hour presentation on Tuesday, June 18. \u201cWhat we want to do is operationalize your knowledge so that you feel comfortable knowing what these terms mean, how to get started with some of these issues and \u2026 step beyond being the everyday, end-user type of consumer of cryptography.\u201d The webinar is a follow-up to the June 11 presentation on the value of encryption for HIPAA, PCI and other regulatory frameworks, and a precursor to a hardware and storage-focused webinar scheduled for June 25. Stanislav said one goal of the webinar was to define \u201chow..."}