SSL Certificates are small data files that digitally bind a cryptographic key to an organization’s details. When installed on a web server, it activates the padlock and the https protocol and allows secure connections from a web server to a browser. Typically, SSL is used to secure credit...									
			
							
			
					Posts by root
Certificate Authorities & Trust Hierarchies
				
					03				
				
					Jan				
			
						
			
					
What are Certificate Authorities & Trust Hierarchies?
Certificate Authorities, or Certificate Authorities / CAs, issue Digital Certificates. Digital Certificates are verifiable small data files that contain identity credentials to help websites, people, and devices represent their authentic online identity (authentic because the CA has verified...									
			
							
			
					The 3 main hunting phases followed by Falcon’s Shield Security threat hunters
				
					19				
				
					Dec				
			
						
			
					
Proactive actions
Following an intrusion, an attack goes through several phases which constitute the “kill chain” and the execution of the latter from end to end lasts an average of 6 months. By assuming that our client has suffered an intrusion...									
			
							
			
					Cloud security is IT security
				
					04				
				
					Dec				
			
						
			
					
Cloud security is the protection of data, applications, and infrastructures involved in cloud computing. Many aspects of security for cloud environments (whether it’s a public, private, or hybrid cloud) are the same as for any on-premise IT architecture.
High-level security concerns—like unauthorized data exposure and leaks, weak access controls, susceptibility...									
			
							
			
					Hacking Website and web applications Statistics 2020
				
					01				
				
					Dec				
			
						
			
					
Every developer, agency or website owner should be aware of the alarming state of website hacking statistics and cyber security statistics. Almost every software built can be “hacked” in some way and statistics will give some insight on where to point your focus to.
Hacking...									
			
							
			
					Top 10 Web Application Security Risks
				
					01				
				
					Dec				
			
						
			
					
Injection. Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data...									
			
							
			
					Seven Layers of Open Systems Interconnection (OSI) Model
				
					17				
				
					Nov				
			
						
			
					
Seven Layers of OSI Model and functions of seven layers of OSI model
In Seven Layers of Open Systems Interconnection (OSI) Model lesson, you will learn about the seven layers of OSI model and their functions.
If network communications need to happen without...									
			
							
			
					What is Data Loss Prevention (DLP)?
				
					26				
				
					Sep				
			
						
			
					
 
Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users. DLP software classifies regulated, confidential and business critical data and identifies violations of policies defined by...									
			
							
			
					What is IDS?
				
					25				
				
					Sep				
			
						
			
					
An intrusion detection system (IDS) is a device, or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A...									
			
							
			
					What is ISO 27001?
				
					25				
				
					Sep				
			
						
			
					
What is ISO 27001 and why do I need it?
ISO 27001:2013 is the internationally recognised best practice framework for an Information Security Management System (ISMS). It is one of the most popular information security standards worldwide.
About the ISO and IEC