dcsimg

How to Make an Offline Root Certificate Authority for Windows PKI in WSL

Using WSL for the offline root allows us to protect it easily. Using Windows Server as the intermediate allows us maximal benefits. Full how-to guide. Read the post here: How to Make an Offline Root Certificate Authority for Windows PKI in WSL … [Read more...]

Marriott Hotels Discloses Data Breach Affecting 500M Customers

Today, the world's largest hotel chain, Marriott International, disclosed what may be turn out to be one of the largest data breaches in history. … [Read more...]

File Transfer Tools Can Lead to GDPR Non-Compliance

It’s the proverbial 1,000-pound gorilla—a compliance violation. Perhaps you haven’t seen one yet, but you know it’s out there lurking, and it just might come banging on your door any day now.  … [Read more...]

Public Key Infrastructure Explained | Everything you need to know

A full guide to Public Key Infrastructure (PKI) including terminology, core uses, Certificates, Insurance Process, SSL Encrypted Communications, and more Read the post here: Public Key Infrastructure Explained | Everything you need to know … [Read more...]

Security round up

Security round up With so much cyber security news flying around, it is hard to keep track of the bigger stories that emerged. Here is the GFI Security round-up of the three top cyber security stories. Federal bug bounty programmes seem to pay off The United States Marine Corps is a branch of the United […] … [Read more...]

Defrag This – Is the GDPR Being Effective?

The GDPR is in effect and being enforced, and yet there are still so many questions as to how the new data protection regulation in the EU is going to influence how businesses approach the securing and processing of personal data of EU residents. … [Read more...]

The best patch management strategy for 2019

Patch management causes headaches. Just ask any IT manager or sysadmin! How do you keep all your systems patched against the never ending onslaught of security vulnerabilities? … [Read more...]

Meet your risk assessment requirements with vsRisk Cloud

Risk assessments play an essential role in information security, as they are the primary way organisations identify vulnerabilities and the ways data breaches can occur. The results of the risk assessment dictate defence strategies and are used by senior staff to allocate information security and business continuity budgets. This shouldn’t be a surprise for organisations that follow the … [Read more...]

How to tighten security and increase privacy on your browser

Is my browser making an effort to keep my system safe and my online behavior private? This is usually not the first question we ask ourselves when we choose our default browser. But maybe it should be. These days, threats to your privacy and security come at your from all angles, but browser-based attacks such as malvertising, drive-by downloads, adware, tracking, and rogue apps make going online … [Read more...]