How to Move from Manual to Certificate Automation with ACME
For IT teams, managing certificates can feel like a relentless cycle of tracking expiration dates, renewing …
Published on Wednesday November 20, 2024 at accutivesecurity.comMSC Trustgate's SigningHub case study | Blog | Ascertia
MSC Trustgate is a licensed Certification Authority (CA) based in Malaysia, providing extensive PKI solutions to …
Published on Tuesday November 19, 2024 at blog.ascertia.comTrustSEC Returns to Trustech 2024: Showcasing Breakthroughs in Biometric Smartcards Solutions
Deprecated: preg_split(): Passing null to parameter #2 ($subject) of type string is deprecated in …
Published on Sunday November 17, 2024 at trustsec.netMicrosoft ADCS Vulnerability – CVE-2024-49019 Escalation of Privilege
The post Microsoft ADCS Vulnerability – CVE-2024-49019 Escalation of Privilege appeared first on PKI Solutions.
Published on Thursday November 14, 2024 at www.pkisolutions.comEstablishment of the Saudi-Estonian Business Council and participation in BibanGlobal
Jana Krimpe – Founder and CEO of B.EST Solutions deeply honored to have participated in the recent visit to the Kingdom …
Published on Thursday November 14, 2024 at bestsolutions.eeConfigure Group Policy to Auto-enroll Windows devices
What is the meaning of Group Policy auto-enrollment? In an Active Directory environment, you can leverage Group Policy …
Published on Wednesday November 13, 2024 at www.encryptionconsulting.comShort life certificate and lifecycle management | Blog | Ascertia
In 2020, Google enforced a maximum certificate lifetime of 398 days (13 months) for Transport Layer Security (TLS) …
Published on Wednesday November 13, 2024 at blog.ascertia.comDitch the Data Lake Drama: A Modern SIEM Approach
Strengthen your SecOps with seamlessly integrated, powerful, AI-driven analytics without having to rip and replace your …
Published on Tuesday November 12, 2024 at creaplus.comDigital Identity as a main pillar in electronic relations
La entrada Digital Identity as a main pillar in electronic relations se publicó primero en ANF AC.
Published on Monday November 11, 2024 at anf.esPKI Insights Recap – Is Your PKI Healthy? The Essential Guide to Comprehensive Assessments
The post PKI Insights Recap – Is Your PKI Healthy? The Essential Guide to Comprehensive Assessments appeared first on …
Published on Thursday November 7, 2024 at www.pkisolutions.comSensitive Data Discovery for Enterprises: Turning Data Chaos into Compliance
In today’s data-driven landscape, sensitive information—like PII (Personally Identifiable Information), PHI (Protected …
Published on Wednesday November 6, 2024 at accutivesecurity.com7 reasons why TSPs should leverage qualified remote signing
Trust service providers (TSPs)must offer secure, scalable and compliant solutions to meet the rising demand for remote …
Published on Wednesday November 6, 2024 at blog.ascertia.comSecuring Against Compression Side-Channel Attacks: Threats, Techniques, and Mitigation Strategies
In cybersecurity, side-channel attacks exploit the subtle nuances of a computer system’s physical or software-based …
Published on Tuesday November 5, 2024 at www.encryptionconsulting.comHow Microsoft Defender for Office 365 innovated to address QR code phishing attacks
This blog examines the impact of QR code phishing campaigns and the innovative features of Microsoft Defender for Office …
Published on Monday November 4, 2024 at www.microsoft.comNIS 2: How Cyber Threat Intelligence Can Help You Achieve Compliance
Cyber Threat Intelligence (CTI) can be your secret weapon in navigating the complexities of NIS 2. Read More …
Published on Saturday November 2, 2024 at creaplus.comIntroducing the next-generation SigningHub platform | Blog | Ascertia
The digital landscape is ever-changing, and so are the demands on enterprises, governments and trust service providers …
Published on Friday November 1, 2024 at blog.ascertia.comChinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network
Since August 2023, Microsoft has observed intrusion activity targeting and successfully stealing credentials from …
Published on Thursday October 31, 2024 at www.microsoft.comMicrosoft now a Leader in three major analyst reports for SIEM
Microsoft is positioned in the Leaders Category in the 2024 IDC MarketScape for worldwide SIEM for Enterprise—making it …
Published on Thursday October 31, 2024 at techcommunity.microsoft.com7 cybersecurity trends and tips for small and medium businesses to stay protected
The challenges that small and midsize businesses (SMBs) face when it comes to security continue to increase as it …
Published on Thursday October 31, 2024 at www.microsoft.comThe SOC of the Future: Experts Predict a Revolution in Managed Security Services
Experts predict a future where SOCs are not just reactive, but proactive and predictive, leveraging AI and automation …
Published on Wednesday October 30, 2024 at creaplus.comMicrosoft Ignite: Sessions and demos to improve your security strategy
Join us at Microsoft Ignite 2024 for sessions, keynotes, and networking aimed at giving you tools and strategies to put …
Published on Wednesday October 30, 2024 at www.microsoft.comADSS Web RA: TLS certificate issuance and management
Digital certificates touch every aspect of our lives, both personal and business. They are the most secure and …
Published on Wednesday October 30, 2024 at blog.ascertia.comTest Data Management Best Practices For Sensitive Data
Handling large volumes of sensitive data in testing environments is challenging. You need to protect customer …
Published on Tuesday October 29, 2024 at accutivesecurity.comMidnight Blizzard conducts large-scale spear-phishing campaign using RDP files
Since October 22, 2024, Microsoft Threat Intelligence has observed Russian threat actor Midnight Blizzard sending a …
Published on Tuesday October 29, 2024 at www.microsoft.comAdvania case study | Ascertia | Blog
Based in Iceland’s capital city, Reykjavík, Advania is a “tech company with people at heart”.
Published on Tuesday October 29, 2024 at blog.ascertia.com