BLOG & CASE STUDIES

Dalia Habbak Dalia Habbak

Navigating the New Frontier: The Threat of AI to Cybersecurity

Explore the dynamic interplay between Artificial Intelligence and cybersecurity in our latest blog post. Discover how AI revolutionizes threat detection while also posing new challenges in the digital realm. Delve into the risks of automated attacks, weaponized AI malware, and ethical considerations surrounding AI's role in cybersecurity. Join us as we navigate the evolving landscape of digital security, balancing innovation with vigilance.

Read More
Dalia Habbak Dalia Habbak

ZTFV … Zero Trust & Full Visibility … The 0 & The 1

Like the 0 and the 1, Zero Trust & Full Visibility cannot exist without each other. Full visibility is a pillar of cyber security most often misunderstood. Like anything else that’s “built right”, it must be implemented at the foundational levels first.

Read More
Dalia Habbak Dalia Habbak

The Challenge With TLS1.3 Decryption

With TLS1.3, the only way for a NGFW to exempt traffic from decryption is parsing the SNI extension. This raises a major concern: How do we deal with SNI spoofing?

Read More
Dalia Habbak Dalia Habbak

VirtuCrypt … HSMaaS … Walking Your Walk To The Cloud

With more “cloud-adoption” mandates, the shift to the cloud has become inevitable for the financial services sector. In line with this shift, the shift of HSM infrastructure to the cloud has become a “must have” rather than a “nice to have.”

Read More
Dalia Habbak Dalia Habbak

ZTNA or VDI? … Or Maybe Both!

Data leak protection is one of the major problems that a SASE architecture endeavours to solve. For this reason, ZTNA solutions should inspect for sensitive data at the upload and download.

Read More
Dalia Habbak Dalia Habbak

SBRaaS … SHE’LL BE RIGHT as a SERVICE

Does anyone know why most public cloud providers only support up to TLS 1.2 for their cloud storage data-in-motion encryption? I mean as opposed to the latest and greatest TLS?

Read More
AI Dalia Habbak AI Dalia Habbak

Heard of AI? … How about Artificial DNA?

In a world where IoT devices are expected to reach Trillions, mutual TLS authentication is critical when a device connects to its IoT server. For this to occur, this device must have its “client” certificate and private key loaded on it.

Read More
Dalia Habbak Dalia Habbak

PRIVATE KEYS…. ARE THEY??

Inline of “insider” zero trust, let’s say that we carried out our due care, and replaced all self-signed certificates, which we used for managing our systems.

Read More
Dalia Habbak Dalia Habbak

Cyber Security = Cyber Aware Employees

All the Cyber Security measures and counter measures are not going to mean much if your employees are not cyber aware. Like anything else in business, your people are the most valuable. If they are well trained, they will question and recognise phishing emails, illegitimate phone calls and they will stop an intruder trying to tailgate or piggyback them.

Read More
Dalia Habbak Dalia Habbak

Web Isolation as a Powerful Anti-Phishing Tool

In addition to the first layer of defence, which is an email security solution, we need a tool to deal with the few emails that slip through this first layer. Web based isolation can be integrated with your web-based emails, like Gmail, MS Exchange and Outlook for Office 365.

Read More
Dalia Habbak Dalia Habbak

Automation of DNSSEC DS record rollover

DNSSEC Delegation Signer (DS) Record is a DNS record hosted on Top Level Domains (TLDs) and the Root DNS zone. It is used in DNSSEC to construct a chain of trust between zones and their child zones. For example, there is a DS record for the zone “infoblox.com” hosted in the Name Server of the TLD zone “com”, in turn, there is a DS record for “com” hosted in the Name Server of the root zone.

Read More

OUR SERVICES ENCOMPASS ALL STAGES OF CYBER SECURITY OPTIMISATION PROJECTS

Renaissance IT Services