Sifting through the spines: identifying (potential) Cactus ransomware victims
Authored by Willem Zeeman and Yun Zheng Hu This blog is part of a series written by various Dutch cyber security firms …
Published on Thursday April 25, 2024 at blog.fox-it.comAscertia successfully participates in Plugtests | Ascertia | Blog
Ascertia, a leading digital trust solutions provider, is happy to share the results of its participation in one of the …
Published on Wednesday April 24, 2024 at blog.ascertia.comPreparing for NIS-2 – what you should do now
NIS-2 is on its way The national implementation law for this directive is due to come into force on 18 October 2024, …
Published on Wednesday April 24, 2024 at it-tuv.comBSI warns of cyber threats
In March, the President of the German Federal Office for Information Security (BSI), Claudia Plattner, visited …
Published on Wednesday April 24, 2024 at it-tuv.comBMI publishes new draft bill on the CRITIS umbrella law
The first draft bill of the Federal Ministry of the Interior (BMI) for the CRITIS umbrella law was sharply criticised by …
Published on Wednesday April 24, 2024 at it-tuv.comHackers target critical infrastructure service providers
For some time now, we have been observing a new wave of cyberattacks, which are particularly strong and primarily target …
Published on Wednesday April 24, 2024 at it-tuv.comBiometrics: A Flash Point in AI Regulation
According to proprietary verification data from Onfido (now a part of Entrust), deepfakes rose 3100%... The post …
Published on Monday April 22, 2024 at entrustblog.wpengine.comTop 10 Supply Chain Attacks that Shook the World
Did you know that between 2019 and 2022, software supply chain attacks skyrocketed by an astounding 742%? The surge in …
Published on Monday April 22, 2024 at www.encryptionconsulting.comSoon to be Deprecated – Are you still using RSA 1024 Bit Keys for Windows?
Microsoft has announced that it will depreciate Windows RSA keys shorter than 2048 bits. This step encourages …
Published on Friday April 19, 2024 at www.encryptionconsulting.comThe Continuous Learning Journey in PKI: Insights from The PKI Guy
The post The Continuous Learning Journey in PKI: Insights from The PKI Guy appeared first on PKI Solutions.
Published on Thursday April 18, 2024 at www.pkisolutions.comPKI Solutions Kicks off 2024
The post PKI Solutions Kicks off 2024 appeared first on PKI Solutions.
Published on Thursday April 18, 2024 at www.pkisolutions.comUnlocking Success: The Power of Values in Business
The post Unlocking Success: The Power of Values in Business appeared first on PKI Solutions.
Published on Thursday April 18, 2024 at www.pkisolutions.comWhy Adapt to the Evolving Matrix of X.509 Certificates with CA/Browser Forum Standards
Did you know that only 46% of organizations secured all their digital certificates and keys? As the data suggests, …
Published on Thursday April 18, 2024 at www.encryptionconsulting.comWhy It’s Essential to Be a Book Worm
The post Why It’s Essential to Be a Book Worm appeared first on PKI Solutions.
Published on Wednesday April 17, 2024 at www.pkisolutions.comWhy Is Learning About PKI Technology So Hard?
The post Why Is Learning About PKI Technology So Hard? appeared first on PKI Solutions.
Published on Wednesday April 17, 2024 at www.pkisolutions.comUpgrading the Software and Firmware of a PED-Based Thales Network HSM
Hardware Security Modules, or HSMs, can be a complicated, but important, piece of security infrastructure to maintain. …
Published on Wednesday April 17, 2024 at www.encryptionconsulting.comGoogle’s 90-Day Certificates: Quick and Effective Transition to 90-Day TLS/SSL Certificates
The validity period of Transport Layer Security (TLS) certificates has long been a topic of interest among cybersecurity …
Published on Tuesday April 16, 2024 at www.encryptionconsulting.comDigital Transformations in Africa | Ascertia | Blog
"Africa is poised for unprecedented growth through digital transformation.”
Published on Tuesday April 16, 2024 at blog.ascertia.comUnified Communication Administrator
Unified Communication Administrator Responsibilities: – Develop and maintain comprehensive UC solutions including VoIP, …
Published on Friday April 12, 2024 at datawh.infoUnderstanding Cloud Signature Consortium 2 | Ascertia | Blog
Digital trust is the foundation of modern-day business. Ensuring the security and reliability of electronic document …
Published on Wednesday April 10, 2024 at blog.ascertia.comWhat is a Trust Store and the Issues Associated with It
Secure communication is essential in today’s world, and Trust stores play an important role in ensuring this. A trust …
Published on Tuesday April 9, 2024 at www.encryptionconsulting.comWhat is a QTSP and how do you become one? | Ascertia | Blog
In an increasingly digital world, Qualified Trust Service Providers (QTSPs) emerge as crucial figures. They safeguard …
Published on Tuesday April 9, 2024 at blog.ascertia.comThe New Era of Supply Chain Attacks: Python Developers Hacked in Sophisticated Supply Chain Attack
Did you know that, according to Verizon’s 2022 Data Breach Investigation Report, supply chain attacks were responsible …
Published on Monday April 8, 2024 at www.encryptionconsulting.comWhat is PKI (Public Key Infrastructure)? How does it work?
Key Sections What is PKI? Why do we use PKI? What are the encryptions used in PKI? What are digital certificates? What …
Published on Monday April 8, 2024 at www.encryptionconsulting.comWhat is Public Key Cryptography?
Key Sections Functions of Public-key cryptography Example of public-key cryptography Advantages Disadvantages Conclusion …
Published on Monday April 8, 2024 at www.encryptionconsulting.com