An OpenSSL example screenshot that shows the version of the command line utility tool

OpenSSL Issues Update to Fix Formerly ‘Critical’ Vulnerability Nov. 1

This high-severity vulnerability affects the OpenSSL version 3.0 series. If you’re using an earlier version of OpenSSL (i.e., anything 3.X.X) on your server or platform, then this CVE doesn’t affect... The post OpenSSL Issues Update to Fix Formerly ‘Critical’ Vulnerability Nov. 1 appeared first on Hashed Out by The SSL ... Read More
An edited stock feature image of a person representing an IT engineer.

A CEO’s Guide to Not Becoming the Next Data Breach Headline

Virtually every day, there’s a new headline about some company falling prey to a data breach. We’ve asked 11 industry experts to share their insights on what every CEO needs... The post A CEO’s Guide to Not Becoming the Next Data Breach Headline appeared first on Hashed Out by The ... Read More
A graphic with data from the ACA Compliance Group that shows 44% of companies require third-party vendors to include proof of cybersecurity as part of their RFPs.

10 Cybersecurity Compliance Statistics That Show Why You Must Up Your Cybersecurity Game

Cybersecurity and compliance go together like sushi and rice. You can’t have one without the other and expect things to end well for your business and customers. Let’s explore the... The post 10 Cybersecurity Compliance Statistics That Show Why You Must Up Your Cybersecurity Game appeared first on Hashed Out ... Read More
Side-by-side comparison screenshots of the Windows User Account Control pop-up screen. On the left is the unknown publisher warning message for unsigned software; on the right is a message that shows Microsoft Corporation as the verified publisher.

Changes Coming to OV Code Signing Certificates & Keys Starting Nov. 15

OV code signing certificates and key generation methods are getting an overhaul. They’ll be issued on physical security hardware in a process similar to how EV code signing certificates are... The post Changes Coming to OV Code Signing Certificates & Keys Starting Nov. 15 appeared first on Hashed Out by ... Read More
A side-by-side comparison graphic of an inbox without BIMI (on the left) and with BIMI (on the right). The right side displays the email senders' brand logos while the left displays generic icons -- "G" for GrubHub, "N" for National Geographic, and "F" for Food Network

Apple Joins Google in Adopting BIMI & VMCs for Email

In fall 2022, Apple will roll out its latest operating system for iPhones (iOS 16) and computer devices (MacOS Ventura), which will support brand indicators for message identification. Companies will... The post Apple Joins Google in Adopting BIMI & VMCs for Email appeared first on Hashed Out by The SSL ... Read More
A side-by-side comparison of how inboxes display with and without BIMI verified trademarked logos

USPTO Replaces Paper Trademark Certificates With Digitally Signed PDFs

The U.S. Patent and Trademark Office (USPTO) began issuing digitally signed electronic registration certificates in lieu of the traditional paper (printed) ones starting May 24. Here’s how PKI streamlines the... The post USPTO Replaces Paper Trademark Certificates With Digitally Signed PDFs appeared first on Hashed Out by The SSL Store™ ... Read More
A stock image of a login screen

Latest T-Mobile Attack Underscores Value of PKI Authentication

The teenage hacker group LAPSUS$ used stolen or purchased passwords to infiltrate T-Mobile’s systems multiple times in March 2022. This goes to show why companies can no longer rely on... The post Latest T-Mobile Attack Underscores Value of PKI Authentication appeared first on Hashed Out by The SSL Store™ ... Read More
A stock image of a password written on a sticky note that's left out in the open on a laptop

A $600,000 Reminder to Not Save Your Passwords on Post-It Notes

Data from Chainanalysis shows that $14 billion in cryptocurrency was stolen in 2021 — some of which were due to sophisticated attacks. Here’s one story that’s a pricey reminder to... The post A $600,000 Reminder to Not Save Your Passwords on Post-It Notes appeared first on Hashed Out by The ... Read More
How much data is in the world graphic. This graphic illustrates the distance between the earth and sun in comparison to the expanse that a stack of CDs would extend that would be the equivalent of 64 ZB of data.

How Much Data Is in the World (And How Do You Secure It)?

We always talk about the importance of protecting data — but just how much data is there in the world? And what can you do to keep your sensitive data... The post How Much Data Is in the World (And How Do You Secure It)? appeared first on Hashed Out ... Read More
A screenshot of Google News headlines relating to data breaches

Cybercrime Will Increase — And 9 Other Obvious Cybersecurity Predictions for 2022

While cybercrime and cybersecurity are no laughing matters, many cybersecurity articles tend to state the obvious in their predictions. With this in mind, we thought it would be fun to... The post Cybercrime Will Increase — And 9 Other Obvious Cybersecurity Predictions for 2022 appeared first on Hashed Out by ... Read More