Understanding Passkeys and Hardware Tokens: Building phishing-resistant authentication
Phishing attacks evolved far beyond the poorly written email scams they were known for. Cybercriminals now employ …
Published on Thursday January 16, 2025 at accutivesecurity.comA Success Story of How We Seamlessly Migrated CipherTrust Manager to a New Version
Overview We worked closely with a telecommunication company and guided them in migrating its CipherTrust Manager from …
Published on Thursday January 16, 2025 at www.encryptionconsulting.comEverything You Need to Know About SSH
In today’s interconnected world, where cyberattacks are constantly increasing, securing remote access to our digital …
Published on Wednesday January 15, 2025 at www.encryptionconsulting.comA TSPs Guide to Remote Signing in SigningHub | Ascertia | Blog
The growing focus on global eCommerce, regulatory compliance and client expectations is creating significant …
Published on Wednesday January 15, 2025 at blog.ascertia.comAnalyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions
Microsoft discovered a macOS vulnerability allowing attackers to bypass System Integrity Protection (SIP) by loading …
Published on Monday January 13, 2025 at www.microsoft.com3 takeaways from red teaming 100 generative AI products
Since 2018, Microsoft's AI Red Team has probed generative AI products for critical safety and security vulnerabilities. …
Published on Monday January 13, 2025 at www.microsoft.comNavigating the AI Revolution: Top Security Trends for CISOs
The cybersecurity landscape is constantly evolving, and 2025 promises to be a year of unprecedented challenges and …
Published on Monday January 13, 2025 at creaplus.comAnnouncing the January 2025 PKI Spotlight® Release
The post Announcing the January 2025 PKI Spotlight® Release appeared first on PKI Solutions.
Published on Friday January 10, 2025 at www.pkisolutions.comSigning Apple Applications with Codesign Secure and our Apple CSP
Introduction The applications you find yourself using on your Macintosh (Mac) are .app applications. Applications used …
Published on Friday January 10, 2025 at www.encryptionconsulting.comWhy security teams rely on Microsoft Defender Experts for XDR for managed detection and response
Microsoft Defender Experts for XDR is a mature and proven service that triages, investigates, and responds to incidents …
Published on Monday January 6, 2025 at www.microsoft.comTo Test or Not to Test? That's NOT the Question!
In the face of relentless cyber threats, security testing is not a question of "if" but "how well." By implementing a …
Published on Friday January 3, 2025 at creaplus.comA success story of transforming security operations with upgrading CipherTrust Manager
Company Overview The success story of transforming security operations with upgrading CipherTrust Manager revolves …
Published on Thursday January 2, 2025 at www.encryptionconsulting.comNavigating the EU's Cyber Resilience Act: Strengthening Device Security
The Cyber Resilience Act represents a significant shift in the EU’s approach to digital security. It is not just a …
Published on Thursday January 2, 2025 at creaplus.comThe Autonomous Pentesting Revolution: AI is Reshaping Security
Autonomous pentesting is no longer a luxury—it's a necessity. Organizations that embrace this technology will gain a …
Published on Monday December 30, 2024 at creaplus.comPioneering Post-Quantum Security: Three Decades of Technology Innovation
Since founding 01 Communique in 1992, we’ve maintained an unwavering commitment to technological innovation. Today, …
Published on Monday December 30, 2024 at blog.01com.com01 Communique Positions Itself at the Forefront of Blockchain Security
At 01 Communique, we’ve always believed in staying ahead of technological threats. Today, as quantum computing advances …
Published on Monday December 30, 2024 at blog.01com.comA Gift and a Curse: The Sacrifices Required to Secure Our Future in the Quantum Age
The extraordinary computational power of quantum computers makes them a double-edged sword. While they have the ability …
Published on Sunday December 29, 2024 at blog.01com.comAwareness to Action: Proactively Maintaining Resilience in a Quantum World
After 8 years of intense efforts, in response to the increasingly apparent dangers of post-quantum cybersecurity threat, …
Published on Sunday December 29, 2024 at blog.01com.comEnhancing Data Security in Telecommunication with CipherTrust Manager Rollout
Company Overview With data security’s utmost importance in today’s date, we worked closely with a telecommunication firm …
Published on Friday December 27, 2024 at www.encryptionconsulting.comRisks of TLS Certificate Sharing
Digital security isn’t just about the big moves – sometimes, it’s the small decisions that can cause the most trouble. …
Published on Tuesday December 24, 2024 at www.encryptionconsulting.comHow to manage Digital Certificates in a Multi-Cloud environment
In today’s multi-cloud environment, digital certificates are the foundation of secure communication, data protection and …
Published on Tuesday December 24, 2024 at www.encryptionconsulting.comFuture-Proofing Your PKI: Why Crypto-Agility in HSM Matters
For decades, public-key cryptography algorithms like RSA and ECC have formed the bedrock of digital security. However, …
Published on Monday December 23, 2024 at creaplus.comA guide on how to import certificates to the IIS Server Manager
SSL/TLS certificates are essential for hosting websites on IIS (Internet Information Services) servers as they ensure …
Published on Monday December 23, 2024 at www.encryptionconsulting.comCISO Challenges for 2025: Overcoming Cybersecurity Complexities
As organizations recognize the immense value and criticality of your data and systems, cybersecurity has become …
Published on Thursday December 19, 2024 at accutivesecurity.comNew Microsoft guidance for the CISA Zero Trust Maturity Model
New Microsoft guidance is now available for United States government agencies and their industry partners to help …
Published on Thursday December 19, 2024 at www.microsoft.com