Below we have a collection of Blog posts written by our in-house SSL/TLS and Security Experts, and also a collection of guest posters we invite every so often. In addition, you can find guides for installation and configurations, the best ways to secure your systems, fixes to common problems or updates to the industry.
SSL stands for Secure Sockets Layer, and it is the underlying technology used to protect a web server from potentially malicious actors and actions - through the use of cryptography. With this article, we'll attempt to dispel some false notions about SSL certificates, and explain in the simplest terms possible what SSL is, how it relates to TLS or Transport Layer Security, and what … [read more →]
News came out in 2021 about the Australian Government mandating the essential 8 Cyber Security controls for all non-corporate Commonwealth entities. This is scheduled to be put into practice starting June 2022 with a compliance audit every 5-years. What are the essential 8? The essential 8 is a list of strategies recommended by the Australian Cyber Security Centre (ACSC) to mitigate targeted… [read more →]
As the importance of SSL certificates and cryptographic protocols at large begins to soar, and live security flaws become an ever-more-prominent issue with businesses' and individuals' respective online presences, the notion of security awareness has begun to crystallize, too. Namely, exposing security flaws such as deprecated SSL protocols, private key breaches, and web… [read more →]
Fully Homomorphic Encryption (FHE) is the act of operating on an encrypted dataset without first decrypting it. FHE seems at first to be a very abstract concept, but implemented security is both practical and lucrative. The classical example of its practicality is the ability to send encrypted data to a cloud-based provider whose vast resources are at your disposal on a demand-consumption pricing… [read more →]
Australian companies and individuals are being hit with cyber-attacks and scams daily. As our world relies more heavily on digital technology, we are experiencing a rapid growth in attacks and breaches. Technology is always changing therefore so are the attacks. As a result of the COVID-19 pandemic we have experienced skyrocketing growth in the digital world. Many things that were never… [read more →]