Sam Bocetta
Recent Posts
-
Securing the Automotive Industry: The Role of Digital Certificates in Connected Vehicles
April 22, 2024Connected vehicles are becoming more common but also bring new risks. The auto industry must…
-
Digital Identity in the Age of Remote Work: A New Frontier for Cyber Security
April 11, 2024This blog navigates new standards for cybersecurity in the age of remote and hybrid working,…
-
A Demo of Biometric Tech Has Begun: Expanding the Adoption of Remote Identity Verification
August 04, 2023In this article, we will explore the types of biometric tech and how it is expanding the adoption of…
-
Biometric Authentication: The Good, the Bad, and the Ugly
July 07, 2023This article will look at what biometric authentication is and what it is used for.
-
Mitigating Weaknesses in Microsoft Active Directory Certificate Services
June 15, 2023In this blog, we investigate the security vulnerabilities of Microsoft Active Directory, and explore…
-
How IoT Has Continued To Evolve in the Post-Pandemic Market
April 12, 2023It has been over 3 years since the pandemic accelerated technological developments and sparked new…
-
6 Medical Devices Hackers Like to Target and Why
January 12, 2023Every industry is now at constant risk of a data breach, or criminals accessing their network and…
-
Aviation Starting to Get Hit with Rise of Cyberattacks Post-Pandemic
November 21, 2022Threat actors are turning their attention to the aviation industry post-pandemic, but what…
-
The Risk of Cybersecurity Threats Continues To Grow for the Auto Industry
November 14, 2022Discover the latest innovations driving the risk of cyberattacks in the auto industry, plus the…
-
Preventing Data Breaches: 10 Tactics Every Company Should Implement
October 05, 2022Preventing data breaches is key to ensuring your business is protected. With the average cost of a…
-
What Is Password Salting and How It Can Secure Your Secrets
September 23, 2022Password salting is an essential part of increasing your database security. Read more about password…
-
Why mTLS Should Be Everywhere in Kubernetes and Not Just Entry and Exit
May 31, 2022There are many steps companies can take to secure their Kubernetes workloads. One best practice that…
-
Quantum Resistant Encryption: What is it & Why It’s Critical to Future Cybersecurity
May 12, 2022Quantum computers are advancing quickly. Posing a great risk in the future as they will allow…
-
How to Use and Automate PKI in DevOps?
April 05, 2022PKI is one of the most reliable security authentication tools. But how do we streamline and…
-
How Businesses Can Embrace Automation in Their Data Privacy Practices
September 09, 2021Now more than ever, businesses rely on data and technology to scale their operations. But with the…
-
Understanding Why SSL/TLS Certificates Are Essential for Securing Mobile Applications
October 14, 2020In this article, we’ll discuss why mobile application security is so crucial today, along with…