Packet Detectives EP2 - The case of the unknown TLS versions

TLS Is Only as Strong as Its Weakest Link

Weak encryption is a real risk to data privacy and security. This article, based on Packet Detectives’ episode “The case of the unknown TLS versions,” shows how you can use... The post ...
A screenshot of a tweet about recent ransomware attacks against Brookfield Asset Management

Recent Ransomware Attacks: Latest Ransomware Attack News in 2020

We’ll cover 15 of the most recent ransomware attacks (so far) in 2020 — what they were and who they impacted — as well as some of the latest news... The post ...
What Is Malware? 10 Types of Malware & How They Work

What Is Malware? 10 Types of Malware & How They Work

Malicious code is the thing that nightmares are made of for web users and cybersecurity experts alike — here’s everything to know about malicious code and how hackers use it... The post ...
Screenshot of the BB&T website

What Is a Certificate Authority (CA) and What Do They Do?

Every time you visit a website that starts with HTTPS, you’re using a certificate authority. But what exactly is a CA and how does it make your transactions and communications more secure? ...
Server security graphic

Linux Server Security: 10 Linux Hardening & Security Best Practices

Linux is the most common operating system for web-facing computers. It also runs on three-in-four servers, Netcraft reports. Here's what to know about Linux. The post Linux Server Security: 10 Linux Hardening ...
What Is a CAA Record? Your Guide to Certificate Authority Authorization

What Is a CAA Record? Your Guide to Certificate Authority Authorization

Did you know that there’s an easy way to control which CAs can issue certificates for your domain? Here’s everything to know about CAA records for your DNS. The post What Is ...
Certificate Management Checklist

Everything You Need to Know About OCSP, OCSP Stapling & OCSP Must-Staple

What happens when a hacker gets an SSL certificate’s private key? The CA revokes it. But how does the browser know whether a website’s certificate has been revoked? OCSP is one way ...
BIMI for Gmail: Google Makes Email Identity Indicators Part of Its New Security Updates

BIMI for Gmail: Google Makes Email Identity Indicators Part of Its New Security Updates

Google is partnering with DigiCert and Entrust Datacard to launch a BIMI pilot for Gmail — here's what to know about how it will boost email security and allow companies to show ...
Screenshot of the certificate revocation warning in Google Chrome.

CRL Explained: What Is a Certificate Revocation List?

Need to revoke a certificate? There’s a list for that… X.509 digital certificates are integral to public key infrastructure (PKI) and web security as a whole. But what happens when... The post ...
Email Security Best Practices - 2019 Edition

Breach and Attack Simulations: How to Find the Gaps in Your Cyber Defenses

Breach and attacks simulations are a popular approach to cyber security testing and defenses. Here's what to know about BAS technologies and how they work. The post Breach and Attack Simulations: How ...