framework ethical Best Practices for Data Security

Is It Ethical To Buy Breached Data?

Research that’s done on malicious breaches of data presents a unique conundrum for the security professionals who are doing the investigating: should access to sets of breached raw data become available to public users and, if so, how? In light of the pandemic, the acceleration toward location-distributed work has the ... Read More
Security Boulevard
Ukraine Russia cyberwar hacking

Exposed Hacking Training Videos Provide Insight Into Hacking Ops 

A state-sponsored hacking group linked to Iran has been caught red-handed, demonstrating how to break into email accounts and steal sensitive data. The group accidentally exposed one of its servers, which gave researchers at IBM’s X-Force Incident Response Intelligence Services (IRIS) security team access to five hours of video footage, ... Read More
Security Boulevard
cybersecurity asset management

How To Improve Asset Management and Security

The future of asset management requires organizations invest in digitization, which has the added benefit of improving security You would be amazed at how many organizations still use archaic technologies to keep track of their workloads and vital pieces of information. Fortunately, some companies have begun to make the push ... Read More
Security Boulevard
application layer security

Eye on the End User: Application Layer Security

The application layer is where users interact with your apps, so its security should be paramount. Here are a few considerations Securing applications can be a struggle at the best of times. Today, developers need to ensure that every level of their applications are audited for—and protected against—common vulnerabilities. In ... Read More
Security Boulevard
Graphic illustrating the cloud security concept of limiting access

Cloud Security: 5 Serious Emerging Cloud Computing Threats to Avoid

Data breaches that resulted from cloud misconfigurations cost businesses nearly $3.18 trillion in 2019, according to DivvyCloud — here’s what to know to protect your business The Covid-19 pandemic is... The post Cloud Security: 5 Serious Emerging Cloud Computing Threats to Avoid appeared first on Hashed Out by The SSL ... Read More
Certificate Management Checklist

Eliminate Threats to Your Domain with a Registry Lock

DNS attacks are up 34%, according to IDC’s annual threat report. Here’s what to know about the growing need for domain safety. In 2019, several leading security organizations, including corporations... The post Eliminate Threats to Your Domain with a Registry Lock appeared first on Hashed Out by The SSL Store™ ... Read More
Quantum computing

Post Quantum Cryptography: Data Security in a Post-Quantum World

Just because quantum computing is a few years away doesn’t mean that you should avoid thinking about how to deal with this emerging threat now with quantum resistant algorithms Every... The post Post Quantum Cryptography: Data Security in a Post-Quantum World appeared first on Hashed Out by The SSL Store™ ... Read More
How DNS works

DNS Poisoning Attacks: A Guide for Website Admins

How to protect your website against DNS cache poisoning attacks There are literally hundreds of exploits and several million viruses that could penetrate your network defenses. Going after them all... The post DNS Poisoning Attacks: A Guide for Website Admins appeared first on Hashed Out by The SSL Store™ ... Read More

A Sneaky Online Security Threat: Encrypted Malware in SSL

| | Everything Encryption
Unfortunately, the bad guys use encryption, too Every time you connect to the internet, whether it’s from a phone, tablet, or computer, you accept a certain level of risk. Hackers... The post A Sneaky Online Security Threat: Encrypted Malware in SSL appeared first on Hashed Out by The SSL Store™ ... Read More