SSL Certificates are small data files that digitally bind a cryptographic key to an organization’s details. When installed on a web server, it activates the padlock and the https protocol and allows secure connections from a web server to a browser. Typically, SSL is used to secure credit...
Posts by root
Certificate Authorities & Trust Hierarchies
03
Jan
What are Certificate Authorities & Trust Hierarchies?
Certificate Authorities, or Certificate Authorities / CAs, issue Digital Certificates. Digital Certificates are verifiable small data files that contain identity credentials to help websites, people, and devices represent their authentic online identity (authentic because the CA has verified...
The 3 main hunting phases followed by Falcon’s Shield Security threat hunters
19
Dec
Proactive actions
Following an intrusion, an attack goes through several phases which constitute the “kill chain” and the execution of the latter from end to end lasts an average of 6 months. By assuming that our client has suffered an intrusion...
Cloud security is IT security
04
Dec
Cloud security is the protection of data, applications, and infrastructures involved in cloud computing. Many aspects of security for cloud environments (whether it’s a public, private, or hybrid cloud) are the same as for any on-premise IT architecture.
High-level security concerns—like unauthorized data exposure and leaks, weak access controls, susceptibility...
Hacking Website and web applications Statistics 2020
01
Dec
Every developer, agency or website owner should be aware of the alarming state of website hacking statistics and cyber security statistics. Almost every software built can be “hacked” in some way and statistics will give some insight on where to point your focus to.
Hacking...
Top 10 Web Application Security Risks
01
Dec
Injection. Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data...
Seven Layers of Open Systems Interconnection (OSI) Model
17
Nov
Seven Layers of OSI Model and functions of seven layers of OSI model
In Seven Layers of Open Systems Interconnection (OSI) Model lesson, you will learn about the seven layers of OSI model and their functions.
If network communications need to happen without...
What is Data Loss Prevention (DLP)?
26
Sep
Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users. DLP software classifies regulated, confidential and business critical data and identifies violations of policies defined by...
What is IDS?
25
Sep
An intrusion detection system (IDS) is a device, or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A...
What is ISO 27001?
25
Sep
What is ISO 27001 and why do I need it?
ISO 27001:2013 is the internationally recognised best practice framework for an Information Security Management System (ISMS). It is one of the most popular information security standards worldwide.
About the ISO and IEC