Manage episode 330432234 series 3010159
In this episode we welcome back Robert Boedigheimer, Microsoft MVP, Pluralsight Author and MDC Speaker for part two in our series on cryptography. If you haven't listened to part one (Episode 13), we'd suggest listening to the previous episode, which lays the groundwork for much of what we'll talk about today.
1:05 Encryption across languages
3:10 Symmetric vs Asymmetric encryption
5:45 Examples of when to use Symmetric or Asymmetric
7:45 How often to rotate keys
9:25 Private keys do not equal perfect security
NIST recommendations on key management: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf
Troy Hunt's aggregation site of compromised usernames and passwords: https://haveibeenpwned.com
Robert's full video on Cryptography 101: https://youtu.be/ahgtAvjWYUI
Minnesota Developers Conference: https://mndevconf.com/
Find Robert at @boedie on Twitter.
The Development Best Practices Podcast is brought to you by ILM Professional Services. Do you want to go to a conference covering a plethora of development best practices? Please join me at the Minnesota Developers Conference, where speakers like Robert Boedigheimer, Mike Benkovich and Kaisa Taipale talk about development concepts that can help you today. It's on June 22nd right here in the Twin Cities, and you can get find out more at mndevconf.com.
Finally, if you like what you heard today, please tell a friend about us. If you have any feedback on this episode or have a topic you'd like us to cover, please email us at email@example.com.