01 Communique Partners up with Real Matter to Advance Quantum-Safe Blockchain
In a strategic move 01 Communique has partnered with Hong Kong-based Real Matter Technology Company to bring …
Published on Thursday January 23, 2025 at blog.01com.comListen to KELA discuss how to prevent phishing attacks before they get you
By understanding phishing tactics and embracing advanced threat monitoring, organizations can disrupt the cycle of …
Published on Thursday January 23, 2025 at creaplus.comAn Introduction to Cipher Suites
As consultants in the field of applied cryptography, we often encounter the question of whether enabling encryption is …
Published on Wednesday January 22, 2025 at www.encryptionconsulting.comThe Ultimate Guide to prevent SSH Key Sprawl
You must have come across a situation where you had to download or send some personal information through the web. …
Published on Monday January 20, 2025 at www.encryptionconsulting.comUse Cases and Best Practices with Hardware Security Module (HSM)
Hardware Security Modules (HSMs) emerge as critical components of a robust security infrastructure, acting as …
Published on Friday January 17, 2025 at creaplus.comUnderstanding Passkeys and Hardware Tokens: Building phishing-resistant authentication
Phishing attacks evolved far beyond the poorly written email scams they were known for. Cybercriminals now employ …
Published on Thursday January 16, 2025 at accutivesecurity.comNew Star Blizzard spear-phishing campaign targets WhatsApp accounts
In mid-November 2024, Microsoft Threat Intelligence observed the Russian threat actor we track as Star Blizzard sending …
Published on Thursday January 16, 2025 at www.microsoft.comA Success Story of How We Seamlessly Migrated CipherTrust Manager to a New Version
Overview We worked closely with a telecommunication company and guided them in migrating its CipherTrust Manager from …
Published on Thursday January 16, 2025 at www.encryptionconsulting.comEverything You Need to Know About SSH
In today’s interconnected world, where cyberattacks are constantly increasing, securing remote access to our digital …
Published on Wednesday January 15, 2025 at www.encryptionconsulting.comInnovating in line with the European Union’s AI Act
As our Microsoft AI Tour reached Brussels, Paris, and Berlin recently, we met with European organizations that were …
Published on Wednesday January 15, 2025 at blogs.microsoft.comA TSPs Guide to Remote Signing in SigningHub | Ascertia | Blog
The growing focus on global eCommerce, regulatory compliance and client expectations is creating significant …
Published on Wednesday January 15, 2025 at blog.ascertia.comAnalyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions
Microsoft discovered a macOS vulnerability allowing attackers to bypass System Integrity Protection (SIP) by loading …
Published on Monday January 13, 2025 at www.microsoft.com3 takeaways from red teaming 100 generative AI products
Since 2018, Microsoft's AI Red Team has probed generative AI products for critical safety and security vulnerabilities. …
Published on Monday January 13, 2025 at www.microsoft.comNavigating the AI Revolution: Top Security Trends for CISOs
The cybersecurity landscape is constantly evolving, and 2025 promises to be a year of unprecedented challenges and …
Published on Monday January 13, 2025 at creaplus.comAnnouncing the January 2025 PKI Spotlight® Release
The post Announcing the January 2025 PKI Spotlight® Release appeared first on PKI Solutions.
Published on Friday January 10, 2025 at www.pkisolutions.comSigning Apple Applications with Codesign Secure and our Apple CSP
Introduction The applications you find yourself using on your Macintosh (Mac) are .app applications. Applications used …
Published on Friday January 10, 2025 at www.encryptionconsulting.comWhy security teams rely on Microsoft Defender Experts for XDR for managed detection and response
Microsoft Defender Experts for XDR is a mature and proven service that triages, investigates, and responds to incidents …
Published on Monday January 6, 2025 at www.microsoft.comTo Test or Not to Test? That's NOT the Question!
In the face of relentless cyber threats, security testing is not a question of "if" but "how well." By implementing a …
Published on Friday January 3, 2025 at creaplus.comA success story of transforming security operations with upgrading CipherTrust Manager
Company Overview The success story of transforming security operations with upgrading CipherTrust Manager revolves …
Published on Thursday January 2, 2025 at www.encryptionconsulting.comNavigating the EU's Cyber Resilience Act: Strengthening Device Security
The Cyber Resilience Act represents a significant shift in the EU’s approach to digital security. It is not just a …
Published on Thursday January 2, 2025 at creaplus.comThe Autonomous Pentesting Revolution: AI is Reshaping Security
Autonomous pentesting is no longer a luxury—it's a necessity. Organizations that embrace this technology will gain a …
Published on Monday December 30, 2024 at creaplus.comPioneering Post-Quantum Security: Three Decades of Technology Innovation
Since founding 01 Communique in 1992, we’ve maintained an unwavering commitment to technological innovation. Today, …
Published on Monday December 30, 2024 at blog.01com.com01 Communique Positions Itself at the Forefront of Blockchain Security
At 01 Communique, we’ve always believed in staying ahead of technological threats. Today, as quantum computing advances …
Published on Monday December 30, 2024 at blog.01com.comA Gift and a Curse: The Sacrifices Required to Secure Our Future in the Quantum Age
The extraordinary computational power of quantum computers makes them a double-edged sword. While they have the ability …
Published on Sunday December 29, 2024 at blog.01com.comAwareness to Action: Proactively Maintaining Resilience in a Quantum World
After 8 years of intense efforts, in response to the increasingly apparent dangers of post-quantum cybersecurity threat, …
Published on Sunday December 29, 2024 at blog.01com.com