Balancing Privacy and Security: Lessons Learned from Telegram’s Controversy
On Sunday August 25th, 2024, Pavel Durov, the 39-year-old Russian-born billionaire and CEO of Telegram was arrested at a …
Published on Friday September 6, 2024 at blog.01com.comEverything You Need To Know About PKI-as-a-Service (PKIaaS)
PKI-as-a-service involves deploying and managing an organization’s Public Key Infrastructure (PKI) on a cloud-based …
Published on Friday September 6, 2024 at www.encryptionconsulting.comManaging Certificate Chaos After Google’s Entrust Distrust
When Google decided to stop trusting new TLS certificates from Entrust, it didn’t just create a technical challenge—it …
Published on Thursday September 5, 2024 at accutivesecurity.comThe Challenges Organizations Face with NIS 2 and DORA
NIS 2 and DORA are undoubtedly a positive development in cyber security. However, they also raise a number of questions …
Published on Sunday September 1, 2024 at creaplus.comThe art and science behind Microsoft threat hunting: Part 3
In this blog post, read how Microsoft Incident Response leverages three types of threat intelligence to enhance incident …
Published on Wednesday August 28, 2024 at www.microsoft.comData Masking Challenges in Complex Data Environments and How to Tackle them
As a database administrator, you don’t just maintain systems—you protect your organization’s most sensitive data. With …
Published on Wednesday August 28, 2024 at accutivesecurity.comPeach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations
Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new …
Published on Wednesday August 28, 2024 at www.microsoft.comHow Microsoft Entra ID supports US government agencies in meeting identity security requirements
United States Government agencies are adopting Microsoft Entra ID to consolidate siloed identity solutions, reduce …
Published on Monday August 26, 2024 at www.microsoft.comMicrosoft AI Tour: Hear the latest product innovations to elevate your security strategy
The Microsoft AI Tour is coming to a city near you. Join a free, one-day tour event to learn how we are making AI …
Published on Thursday August 22, 2024 at www.microsoft.comMicrosoft again ranked number one in modern endpoint security market share
IDC Worldwide Corporate Endpoint Security Market Shares report for 2023 ranks Microsoft number one in market share with …
Published on Wednesday August 21, 2024 at www.microsoft.comHow to Implement GDPR Data Masking Without Sacrificing Data Usability
If you work with customer data, ensuring GDPR compliance by masking all your PII is crucial. But GDPR data masking is …
Published on Tuesday August 20, 2024 at accutivesecurity.comAI Performance: Measuring Success Beyond the Hype
AI can be a game-changer, but it's crucial to measure its real impact – the "AI performance" – to ensure investments …
Published on Tuesday August 20, 2024 at creaplus.comUnderstanding the Importance of HSMs in Achieving PCI DSS Compliance
Payment Card Industry Data Security Standard, generally called PCI DSS, is a security standard created to reduce …
Published on Friday August 16, 2024 at www.encryptionconsulting.comTo Revoke or Not to Revoke: Balancing Security with Performance and Operational Complexity
The post To Revoke or Not to Revoke: Balancing Security with Performance and Operational Complexity appeared first on …
Published on Friday August 16, 2024 at www.pkisolutions.comIn-Depth Analysis of FIPS 205: Stateless Hash-Based Digital Signature Standard
The Federal Information Processing Standards Publication (FIPS) 205 introduces a groundbreaking approach to digital …
Published on Tuesday August 13, 2024 at www.encryptionconsulting.comUnderstanding FIPS 204: The Module-Lattice-Based Digital Signature Standard
The Federal Information Processing Standards Publication (FIPS) 204 introduces the Module-Lattice-Based Digital …
Published on Tuesday August 13, 2024 at www.encryptionconsulting.comIron Mountain's SigningHub case study | Ascertia | Blog
Iron Mountain was founded over 70 years ago, serving as a strategic partner in storage and information management. It's …
Published on Tuesday August 13, 2024 at blog.ascertia.comSynthetic vs. Realistic Data for Gen AI & LLM?
How are you training your generative AI models? In AI and machine learning (AI-ML), the type of data you choose can make …
Published on Tuesday August 13, 2024 at accutivesecurity.comIn-Depth Overview of FIPS 203: The Module-Lattice-Based Key-Encapsulation Mechanism Standard
The Federal Information Processing Standards (FIPS) 203 publication introduces the Module-Lattice-Based …
Published on Tuesday August 13, 2024 at www.encryptionconsulting.comYour Guide to The New Federal Quantum Action Plan
As quantum computing continues to advance, the potential threat it poses to traditional cryptography has become a …
Published on Monday August 12, 2024 at www.encryptionconsulting.comRace Against Time: Preparing for The Inevitable Q-Day
There is no questioning that the development of quantum computers will potentially enhance various aspects of our life. …
Published on Friday August 9, 2024 at blog.01com.comChained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE
Microsoft researchers found multiple vulnerabilities in OpenVPN that could lead to an attack chain allowing remote code …
Published on Thursday August 8, 2024 at www.microsoft.comWhy Do Enterprises Need HSM Support?
Most, if not all, organizations in today’s world have or require a Hardware Security Module, or HSM, for their …
Published on Thursday August 8, 2024 at www.encryptionconsulting.comBest Data Masking Tools Gartner (Updated 2024) : Comparing top-rated tools
Choosing the right data masking tools can be overwhelming with many options available in the market. Gartner Peer …
Published on Wednesday August 7, 2024 at accutivesecurity.comHow Microsoft and NIST are collaborating to advance the Zero Trust Implementation
Both Microsoft and the National Institute of Standards and Technology (NIST) National Cyber security Center of …
Published on Tuesday August 6, 2024 at www.microsoft.com