- On August 14th, 2023
- In Uncategorized
Safeguarding Your Code: Protecting Against Supply Chain Exploits
In just quarter of 2023, a whopping 7,153 new Common Threats and Vulnerabilities were discovered in the National Vulnerability Database…
Read moreIn just quarter of 2023, a whopping 7,153 new Common Threats and Vulnerabilities were discovered in the National Vulnerability Database…
Read moreRecently, Google announced that it will be replacing the lock icon with a new one that looks like a music note, typically associated……
Read moreCode signing is broadly recognized as a critical step in conveying trust to software users and protecting companies from harm caused by….
Read moreToday, April 1st, is the best time to revisit some of the Smart IT Hygiene that an organization can employ to avoid being a ‘Cyber Fool’.
Read moreFake website scams continue to cost online users a lot of money. So, here’s a checklist to look for in a website to spot the real and the copycat.
Read moreZero Trust basically suggests it is not adequate to rely on perimeter-based security, it has to be in the perimeter across people, devices, Data, Networks, and workloads to include strong identification, authentication, isolation, encryption, and segregation, this also ensures that each transaction is subjected to maximum scrutiny. Hence, the time and money spent on cybersecurity, […]
Read moreSince almost 2 decades e commerce has been growing at a rapid pace and the organization’ digital brand is been gaining immense importance in the market, now with an increasing malicious websites who hide behind encryption, it is important to have trust and face value is gaining importance. This where the customers get confused and […]
Read moreThere are plenty of enterprise use cases where companies need SSL certificate for IP address. Companies use IP addresses to access various types of applications via internet or intranet. Based on the organization strategies you would want to secure IP addresses with SSL certificates. In this article, I am going to explain you the process […]
Read moreA big announcement came out on SSL Certificate validity at the face-to-face meeting of the CA/Browser Forum (CA/B Forum) at Bratislava, Slovakia on 19th February 2020. CA/B Forum is the industry standards group which consists of Certificate Authority (CA) and several of the major browsers. The announcement stated that starting from 1st September 2020 Apple’s Safari […]
Read moreRootkit has been around for nearly 20 years now, allowing hackers/attackers to get access to user machines and steal data without being detected for long periods of time. In the recent month, a malicious campaign had been identified where a Chinese hacker dropped Rootkit in 50,000 servers (containing Windows MS-SQL and PhpMyAdmin server around the […]
Read more