Everything Encryption
PCI Compliance Numbers Drop as Security Breaches Increase
A mere 27.9% of organizations are PCI DSS compliant — an alarming number in the face of rising security threats… A concerning issue has arisen for the payment processing industry... The post ...
Java Ransomware (Literally): Not Even Your Coffee Maker Is Safe
The Proliferation of IoT Devices is Brewing New Security Vulnerabilities in the Most Unlikely Places Your alarm goes off and you crawl out of bed, just like every other day.... The post ...
Say Goodbye to 2-Year Certificates and Hello to Multi-Year SSL Plans
As of September 1st, 2-year certificates have been replaced by multi-year SSL plans offering similar benefits September 1, 2020 marked the dawn of a new era for SSL certificates. Multi-year... The post ...
Raccoon Attack: Researchers Find A Vulnerability in TLS 1.2
Bad news: there’s a vulnerability in TLS 1.2. Good news: researchers say it’s “very hard to exploit” and major vendors have already released security patches for it. A team of... The post ...
Rehash: How to Fix the SSL/TLS Handshake Failed Error
Fixes for the SSL/TLS handshake failed error for both internet users and site owners It’s time for another technical article. Today, we’re going to discuss the SSL/TLS handshake failed error... The post ...
The Day the Music Died: Certificate Expiration Takes Down Spotify
“Something expired deep insideThe day the music died” Earlier this week, the music streaming service Spotify went down for about an hour. (We “heard it from a friend who heard... The post ...
Your Guide to How PKI Works & Secures Your Organization
Public key infrastructure secures everything from the login credentials in your browser to the sensitive data you share via email — here’s how PKI works. The post Your Guide to How PKI ...
12 Enterprise Encryption Key Management Best Practices
From centralization to automation, here’s your 12-step guide to being more proactive with your enterprise’s encryption key management “What’s the first thing I need to protect data stored on our... The post ...
Types of Encryption: 5 Encryption Algorithms & How to Choose the Right One
We’ll break down the two main types of encryption — symmetric and asymmetric — before diving into the list of the 5 most commonly used encryption algorithms to simplify them... The post ...
Advanced Encryption Standard (AES): What It Is and How It Works
Understanding advanced encryption standard on basic level doesn’t require a higher degree in computer science or Matrix-level consciousness — let’s break AES encryption down into layman’s terms Hey, all. We... The post ...