Encrypted user data and storing hashed RSA keys on the server for backup reasons

Imagine a mobile app that connects to an API server.
Disclaimer
I’m not sure if RSA is the right technique for this, please feel free to recommend alternatives.
The goal
The backend/database super users should not be able to recognize pers… Continue reading Encrypted user data and storing hashed RSA keys on the server for backup reasons

Microsoft Purview Sensitivity labels, best practices for setup?

Background
There have been more than a handful of recent security breaches at my company, involving social engineering and spoofed emails.
A malicious actor fraudulently spoofing one of our customers, sends an email to a user at my company… Continue reading Microsoft Purview Sensitivity labels, best practices for setup?

Would my hypothetical Opsec setup with the goal of compartmentalizing sensitive areas from an insecure sandbox be sensible?

The root cause of my problem stems from the fact that I need to run untrustworthy software on a bare metal windows machine, which means that I can’t just have it in a VM because of major performance hits which make the software unusable.
A… Continue reading Would my hypothetical Opsec setup with the goal of compartmentalizing sensitive areas from an insecure sandbox be sensible?

How do I report that the organization is using common passwords for the backend [duplicate]

I was surfing on a big company’s website, and I tried to make an account on it. I found that the account registration was quite buggy so I checked the page source. I found that there were error logs generated by an index.js file. The index… Continue reading How do I report that the organization is using common passwords for the backend [duplicate]