Securing your Windows Environment with CodeSign Secure and AppLocker
Securing your environment is very crucial in the current security-driven world. Every enterprise needs to secure their …
Published on Thursday September 12, 2024 at www.encryptionconsulting.comHow to confidently mask PII without missing a single data point?
Protecting sensitive data isn’t just a technical challenge—it’s a balancing act. PII masking is critical to ensuring …
Published on Wednesday September 11, 2024 at accutivesecurity.comHow NIST’s New PQC Algorithms Impact You
The National Institute of Standards and Technology (NIST) has officially released the first three post-quantum …
Published on Tuesday September 10, 2024 at www.encryptionconsulting.comTrustAsia case study | Ascertia | Blog
TrustAsia, a Chinese Certification Authority, is a partner of Ascertia. It is known throughout China as a leading …
Published on Tuesday September 10, 2024 at blog.ascertia.comBalancing Privacy and Security: Lessons Learned from Telegram’s Controversy
On Sunday August 25th, 2024, Pavel Durov, the 39-year-old Russian-born billionaire and CEO of Telegram was arrested at a …
Published on Friday September 6, 2024 at blog.01com.comEverything You Need To Know About PKI-as-a-Service (PKIaaS)
PKI-as-a-service involves deploying and managing an organization’s Public Key Infrastructure (PKI) on a cloud-based …
Published on Friday September 6, 2024 at www.encryptionconsulting.comManaging Certificate Chaos After Google’s Entrust Distrust
When Google decided to stop trusting new TLS certificates from Entrust, it didn’t just create a technical challenge—it …
Published on Thursday September 5, 2024 at accutivesecurity.comThe Challenges Organizations Face with NIS 2 and DORA
NIS 2 and DORA are undoubtedly a positive development in cyber security. However, they also raise a number of questions …
Published on Sunday September 1, 2024 at creaplus.comNorth Korean threat actor Citrine Sleet exploiting Chromium zero-day
Microsoft identified a North Korean threat actor exploiting a zero-day vulnerability in Chromium (CVE-2024-7971) to gain …
Published on Friday August 30, 2024 at www.microsoft.comThe art and science behind Microsoft threat hunting: Part 3
In this blog post, read how Microsoft Incident Response leverages three types of threat intelligence to enhance incident …
Published on Wednesday August 28, 2024 at www.microsoft.comData Masking Challenges in Complex Data Environments
As a database administrator, you don’t just maintain systems—you protect your organization’s most sensitive data. With …
Published on Wednesday August 28, 2024 at accutivesecurity.comPeach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations
Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new …
Published on Wednesday August 28, 2024 at www.microsoft.comHow Microsoft Entra ID supports US government agencies in meeting identity security requirements
United States Government agencies are adopting Microsoft Entra ID to consolidate siloed identity solutions, reduce …
Published on Monday August 26, 2024 at www.microsoft.comMicrosoft AI Tour: Hear the latest product innovations to elevate your security strategy
The Microsoft AI Tour is coming to a city near you. Join a free, one-day tour event to learn how we are making AI …
Published on Thursday August 22, 2024 at www.microsoft.comMicrosoft again ranked number one in modern endpoint security market share
IDC Worldwide Corporate Endpoint Security Market Shares report for 2023 ranks Microsoft number one in market share with …
Published on Wednesday August 21, 2024 at www.microsoft.comHow to Implement GDPR Data Masking Without Sacrificing Data Usability
If you work with customer data, ensuring GDPR compliance by masking all your PII is crucial. But GDPR data masking is …
Published on Tuesday August 20, 2024 at accutivesecurity.comAI Performance: Measuring Success Beyond the Hype
AI can be a game-changer, but it's crucial to measure its real impact – the "AI performance" – to ensure investments …
Published on Tuesday August 20, 2024 at creaplus.comUnderstanding the Importance of HSMs in Achieving PCI DSS Compliance
Payment Card Industry Data Security Standard, generally called PCI DSS, is a security standard created to reduce …
Published on Friday August 16, 2024 at www.encryptionconsulting.comTo Revoke or Not to Revoke: Balancing Security with Performance and Operational Complexity
The post To Revoke or Not to Revoke: Balancing Security with Performance and Operational Complexity appeared first on …
Published on Friday August 16, 2024 at www.pkisolutions.comIn-Depth Analysis of FIPS 205: Stateless Hash-Based Digital Signature Standard
The Federal Information Processing Standards Publication (FIPS) 205 introduces a groundbreaking approach to digital …
Published on Tuesday August 13, 2024 at www.encryptionconsulting.comUnderstanding FIPS 204: The Module-Lattice-Based Digital Signature Standard
The Federal Information Processing Standards Publication (FIPS) 204 introduces the Module-Lattice-Based Digital …
Published on Tuesday August 13, 2024 at www.encryptionconsulting.comIron Mountain's SigningHub case study | Ascertia | Blog
Iron Mountain was founded over 70 years ago, serving as a strategic partner in storage and information management. It's …
Published on Tuesday August 13, 2024 at blog.ascertia.comSynthetic vs. Realistic Data for Gen AI & LLM?
How are you training your generative AI models? In AI and machine learning (AI-ML), the type of data you choose can make …
Published on Tuesday August 13, 2024 at accutivesecurity.comIn-Depth Overview of FIPS 203: The Module-Lattice-Based Key-Encapsulation Mechanism Standard
The Federal Information Processing Standards (FIPS) 203 publication introduces the Module-Lattice-Based …
Published on Tuesday August 13, 2024 at www.encryptionconsulting.comYour Guide to The New Federal Quantum Action Plan
As quantum computing continues to advance, the potential threat it poses to traditional cryptography has become a …
Published on Monday August 12, 2024 at www.encryptionconsulting.com