Hashing Out Cyber Security
TLS Is Only as Strong as Its Weakest Link
Weak encryption is a real risk to data privacy and security. This article, based on Packet Detectives’ episode “The case of the unknown TLS versions,” shows how you can use... The post ...
Recent Ransomware Attacks: Latest Ransomware Attack News in 2020
We’ll cover 15 of the most recent ransomware attacks (so far) in 2020 — what they were and who they impacted — as well as some of the latest news... The post ...
What Is Malware? 10 Types of Malware & How They Work
Malicious code is the thing that nightmares are made of for web users and cybersecurity experts alike — here’s everything to know about malicious code and how hackers use it... The post ...
What Is a Certificate Authority (CA) and What Do They Do?
Every time you visit a website that starts with HTTPS, you’re using a certificate authority. But what exactly is a CA and how does it make your transactions and communications more secure? ...
Linux Server Security: 10 Linux Hardening & Security Best Practices
Linux is the most common operating system for web-facing computers. It also runs on three-in-four servers, Netcraft reports. Here's what to know about Linux. The post Linux Server Security: 10 Linux Hardening ...
What Is a CAA Record? Your Guide to Certificate Authority Authorization
Did you know that there’s an easy way to control which CAs can issue certificates for your domain? Here’s everything to know about CAA records for your DNS. The post What Is ...
Everything You Need to Know About OCSP, OCSP Stapling & OCSP Must-Staple
What happens when a hacker gets an SSL certificate’s private key? The CA revokes it. But how does the browser know whether a website’s certificate has been revoked? OCSP is one way ...
BIMI for Gmail: Google Makes Email Identity Indicators Part of Its New Security Updates
Google is partnering with DigiCert and Entrust Datacard to launch a BIMI pilot for Gmail — here's what to know about how it will boost email security and allow companies to show ...
CRL Explained: What Is a Certificate Revocation List?
Need to revoke a certificate? There’s a list for that… X.509 digital certificates are integral to public key infrastructure (PKI) and web security as a whole. But what happens when... The post ...
Breach and Attack Simulations: How to Find the Gaps in Your Cyber Defenses
Breach and attacks simulations are a popular approach to cyber security testing and defenses. Here's what to know about BAS technologies and how they work. The post Breach and Attack Simulations: How ...
