Author Archives: rgblog

Using asymmetric capabilities to secure files using GPG

In my previous posts I discussed how GPG can be used to encrypt a large file using a symmetric key (passphrase). Provided keys are changed regularly, this approach has clear advantages in terms of simplicity, speed, and authentication of the parties. However the loss or theft of the key would break the security assumptions allowing… Read More »

GPG and key generation

In this post I’m walking through the process of creating a GPG key. This is needed for GPG operations that require either the public or private key for encryption or signing, respectively. I’ll be referring to this post in a future post where I talk about the combination of PKC and GPG to support secure… Read More »

BCS Configuration Management Specialist Group – Shadow IT event

Details arrived in inbox today of an interesting event being organised at BCS Covent Garden that I thought I’d share: Configuration Management SG – Shining a light on Shadow IT in a subscription focused market Venue: BCS, The Chartered Institute for IT Tuesday, 15 January 2019 from 18:00 to 20:30 (GMT) London, United Kingdom You… Read More »