PCI Compliance - COVID-19-related-domains - unsafe connections increasing

PCI Compliance Numbers Drop as Security Breaches Increase

A mere 27.9% of organizations are PCI DSS compliant — an alarming number in the face of rising security threats… A concerning issue has arisen for the payment processing industry... The post ...
What a hacked coffee machine looks like.

Java Ransomware (Literally): Not Even Your Coffee Maker Is Safe

| | Everything Encryption
The Proliferation of IoT Devices is Brewing New Security Vulnerabilities in the Most Unlikely Places Your alarm goes off and you crawl out of bed, just like every other day.... The post ...
DigiCert Secure Site SSL Multi-Year Options

Say Goodbye to 2-Year Certificates and Hello to Multi-Year SSL Plans

As of September 1st, 2-year certificates have been replaced by multi-year SSL plans offering similar benefits September 1, 2020 marked the dawn of a new era for SSL certificates. Multi-year... The post ...
Unbelievable moment clever racoon cracks locked bin in SECONDS

Raccoon Attack: Researchers Find A Vulnerability in TLS 1.2

Bad news: there’s a vulnerability in TLS 1.2. Good news: researchers say it’s “very hard to exploit” and major vendors have already released security patches for it. A team of... The post ...
TLS handshake failed

Rehash: How to Fix the SSL/TLS Handshake Failed Error

Fixes for the SSL/TLS handshake failed error for both internet users and site owners It’s time for another technical article. Today, we’re going to discuss the SSL/TLS handshake failed error... The post ...
Twitter: is Spotify down for anyone else

The Day the Music Died: Certificate Expiration Takes Down Spotify

“Something expired deep insideThe day the music died” Earlier this week, the music streaming service Spotify went down for about an hour. (We “heard it from a friend who heard... The post ...
A graphic illustration of how PKI works

Your Guide to How PKI Works & Secures Your Organization

Public key infrastructure secures everything from the login credentials in your browser to the sensitive data you share via email — here’s how PKI works. The post Your Guide to How PKI ...
Graphic representing encryption keys that need to be managed to improve security

12 Enterprise Encryption Key Management Best Practices

From centralization to automation, here’s your 12-step guide to being more proactive with your enterprise’s encryption key management “What’s the first thing I need to protect data stored on our... The post ...
Types of encryption graphic: How symmetric encryption works

Types of Encryption: 5 Encryption Algorithms & How to Choose the Right One

We’ll break down the two main types of encryption — symmetric and asymmetric — before diving into the list of the 5 most commonly used encryption algorithms to simplify them... The post ...
Advanced Encryption Standard (AES): What It Is and How It Works

Advanced Encryption Standard (AES): What It Is and How It Works

Understanding advanced encryption standard on basic level doesn’t require a higher degree in computer science or Matrix-level consciousness — let’s break AES encryption down into layman’s terms Hey, all. We... The post ...