
BLOG & CASE STUDIES
Navigating the New Frontier: The Threat of AI to Cybersecurity
Explore the dynamic interplay between Artificial Intelligence and cybersecurity in our latest blog post. Discover how AI revolutionizes threat detection while also posing new challenges in the digital realm. Delve into the risks of automated attacks, weaponized AI malware, and ethical considerations surrounding AI's role in cybersecurity. Join us as we navigate the evolving landscape of digital security, balancing innovation with vigilance.
ZTFV … Zero Trust & Full Visibility … The 0 & The 1
Like the 0 and the 1, Zero Trust & Full Visibility cannot exist without each other. Full visibility is a pillar of cyber security most often misunderstood. Like anything else that’s “built right”, it must be implemented at the foundational levels first.
The Challenge With TLS1.3 Decryption
With TLS1.3, the only way for a NGFW to exempt traffic from decryption is parsing the SNI extension. This raises a major concern: How do we deal with SNI spoofing?
VirtuCrypt … HSMaaS … Walking Your Walk To The Cloud
With more “cloud-adoption” mandates, the shift to the cloud has become inevitable for the financial services sector. In line with this shift, the shift of HSM infrastructure to the cloud has become a “must have” rather than a “nice to have.”
ZTNA or VDI? … Or Maybe Both!
Data leak protection is one of the major problems that a SASE architecture endeavours to solve. For this reason, ZTNA solutions should inspect for sensitive data at the upload and download.
Consulting Without Training … A Car With No Wheels
In today’s cyber security engagements, it is not enough for consultants to implement a solution, then walk away. A great consulting experience must culminate in effective customer enablement.
SBRaaS … SHE’LL BE RIGHT as a SERVICE
Does anyone know why most public cloud providers only support up to TLS 1.2 for their cloud storage data-in-motion encryption? I mean as opposed to the latest and greatest TLS?
Heard of AI? … How about Artificial DNA?
In a world where IoT devices are expected to reach Trillions, mutual TLS authentication is critical when a device connects to its IoT server. For this to occur, this device must have its “client” certificate and private key loaded on it.
PRIVATE KEYS…. ARE THEY??
Inline of “insider” zero trust, let’s say that we carried out our due care, and replaced all self-signed certificates, which we used for managing our systems.
JUST LIKE TRUE STRENGTH, TRUE ZERO-TRUST STARTS FROM WITHIN!
Many of the problems in the IT security industry have to do with the lack of internal organisation. They have to do with shabby short-cut practices that are ought to end.
Cyber Security = Cyber Aware Employees
All the Cyber Security measures and counter measures are not going to mean much if your employees are not cyber aware. Like anything else in business, your people are the most valuable. If they are well trained, they will question and recognise phishing emails, illegitimate phone calls and they will stop an intruder trying to tailgate or piggyback them.
Web Isolation as a Powerful Anti-Phishing Tool
In addition to the first layer of defence, which is an email security solution, we need a tool to deal with the few emails that slip through this first layer. Web based isolation can be integrated with your web-based emails, like Gmail, MS Exchange and Outlook for Office 365.
Automation of DNSSEC DS record rollover
DNSSEC Delegation Signer (DS) Record is a DNS record hosted on Top Level Domains (TLDs) and the Root DNS zone. It is used in DNSSEC to construct a chain of trust between zones and their child zones. For example, there is a DS record for the zone “infoblox.com” hosted in the Name Server of the TLD zone “com”, in turn, there is a DS record for “com” hosted in the Name Server of the root zone.