• Smart Security for Smart Cities

    March 15, 2019

    Smart Cities, made possible by the rapid advancement of connected devices, software systems and information communications technologies are helping in the urbanization

  • An Introduction to Economic Risks by FinTech Companies

    October 10, 2018

    FinTech companies bring a huge advantage to our financial landscape, but there are some challenges too. In this post, we discuss the economic risks with FinTech companies and how to mitigate them.

  • What Are Subordinate CAs and Why Would You Want Your Own?

    September 11, 2018

    What is an intermediate or subordinate CA? We take a look at this concept by looking at certificate hierarchy. You will also find out why companies set-up their own intermediate or subordinate CA.

  • What is Social Engineering? The Human Confidence Game

    August 15, 2018

    Those that social engineer are hackers, conducting phishing-like scams with the objective of gaining enough personal information through confidence-instilling questions and exchanges.

  • What is Server Name Indication (SNI)?

    June 01, 2018

    With the increase of HTTPS across the internet there comes many benefits, but there is also some challenges. For example, with HTTP sites, a server uses HTTP HOST headers to determine which HTTP…

  • What's the difference between HTTP and HTTPS?

    May 22, 2018

    Wait, are there really two of those? Casual users rarely notice them, but HTTP (or, http://) and HTTPS (https://) are both options for the start of a URL, showcasing an important difference in all…

  • The Importance of Code Signing Redux

    March 23, 2018

    What? Another blog about code signing? Due to a recent string of related hacking events, we thought it best to return to this topic and clear up some details that may have been unclear.

  • Benefits of Multi-Factor Authentication Blog

    November 24, 2017

    Why should you use multi-factor authentication? Negligent employees are still the no#1 cause of Data Breaches. Don't let poor password practices take down your business. Here's how MFA can save the…

  • Digitally Signing in Adobe: Certifying vs Approval Signatures

    October 06, 2017

    When adding a Digital Signature to an Adobe PDF, you have two options; digitally signing the document or certifying the document. We explain what each one is and how to apply it to your document…

  • What is Certificate Transparency

    August 11, 2017

    What is Certificate Transparency or CT Policy? Here's everything you need to know about Certificate Transparency (CT), including how it works and how you can comply with Google's policy.

  • How to View SSL Certificate Details in Each Browser and What You Can Learn

    June 02, 2017

    Want more information on a website's SSL Certificate? Inspecting a site's SSL Certificate varies from browser to browser so we have created a guide to help you view the SSL Certificate details on your…

  • What is a Trust Seal and Why Does Your Website Need One?

    March 28, 2017

    Trust is essential for any company but especially for those that rely on online sales. Trust indicators, such as seals, can make all the difference between someone choosing to do business with you vs…

  • What is a Man-in-the-Middle Attack and How Can You Prevent It?

    March 01, 2017

    What is a man-in-the-middle cyber-attack and how can you prevent an MITM attack in your own business. This blog explores some of the tactics you can use to keep your organization safe.

  • What is Timestamping?

    February 10, 2017

    What is a timestamp and in particular what is trusted timestamping and how does it work? We also look at common transactions where timestamping would be used.

  • What Is HSTS and How Do I Implement It?

    February 03, 2017

    Guest blogger, Denver Prophit Jr, gives a quick start guide to HSTS. What is HSTS and HSTS preloading, how do you use it and how to implement it on various servers.