Brennenstuhl on
Security Engineering

Hi, I’m Jan Brennenstuhl, a Software Engineer in Security, with focus on authentication and single sign-on. I have a foible for data breaches, account security and passwords. Ask me about OpenID Connect or web application security!

Latest Articles About Jan Brennenstuhl
Ethical Hacking
More on Ethical Hacking →
What is Whaling Cyber Awareness? Prevention Tips & Training

What is Whaling Cyber Awareness? Prevention Tips & Training

In this comprehensive guide I talk about key concepts of cybersecurity awareness training and defensive measures in context of whale phishing. Learn how AI and ML can support whaling prevention and understand why knowledge is our strongest weapon, and vigilance our constant ally.

Whaling Phishing: Definition and Prevention Strategies

Dive deep into the ocean of cyber security, exploring the insidious technique of whaling. Discover why understanding whaling in cyber security can make all the difference in safeguarding your organization from these crafty predators of the digital sea.

Password Attack Guide: What is Password Spraying, How It Works & How to Prevent It

Discover the dark art of password spraying. Learn its inner workings and arm yourself with prevention tactics to safeguard your digital fortress. Defend against malicious attacks with this comprehensive guide.

Identity & Access Management
More on Identity & Access Management →
What is JWA? A Deep Dive into JSON Web Algorithms

What is JWA? A Deep Dive into JSON Web Algorithms

The JSON Web Algorithms (JWA) standard provides definitions for several cryptographic algorithms. These algorithms enable a variety of purposes. In this article I'll introduce you to the essential ideas of JWA and outline how it helps to power e.g. OpenID Connect (OIDC).

Mastering JWKS: JSON Web Key Sets Explained

Mastering JWKS: JSON Web Key Sets Explained

Implementing JSON Web Key Sets (JWKS) is crucial for organizations that want to leverage modern, decentralized authentication and authorization protocols. In this article I discuss the purpose of JWKS, guide you though their technical specification and outline benefits as well as best-practices to securely exposing public key material.

JWE Token: An In-depth Exploration into JSON Web Encryption Standards

JWE Token: An In-depth Exploration into JSON Web Encryption Standards

Have you ever wondered about the intricacies of JSON Web Encryption Standards? Get ready to decode the enigma with this deep dive into JWE Tokens. Gain insightful knowledge and grasp common data security use cases.