Double Encryption: Is It More Secure Or Dangerous?
Since encryption is used to secure data, it would seem only natural that encrypting something twice would increase security. However, that isn't always the case.
Since encryption is used to secure data, it would seem only natural that encrypting something twice would increase security. However, that isn't always the case.
Jeff Edwards | | IT Insights | Security
There are basically two ways to keep data out of the hands of hackers. One is to protect every endpoint leading to it, making it essentially inaccessible. The other is to encrypt the data, so that even if hackers get to the document they cannot read it. But where should...
DevOps, the latest in software engineering and IT operations trends, defines a set of processes, tools, practices, and interactions that foster collaboration between developers and operations to achieve high-quality business outcomes. In this article, we are going to...
Eric Bruno | | Security
Scripting is a popular and powerful choice to automate repeatable file transfer tasks. It can be horrifying, though, to discover just how many scripts are relied on for the successful operation of your infrastructure. This and the time they take to execute are sure to...
A pass the hash attack is a common attack vector utilized by many adversaries. In this attack, a Windows username is paired with the hashed value of a Windows account password. Let's take a deeper look.
If you are a Windows user, you have likely heard of Microsoft AppLocker. This whitelisting program allows Windows users to protect itself from disk based malware by way of restricting executable programs to a specific list of paths, hashes, or signed applications....
Greg Mooney | | Security
If you work in the cyber security field, chances are you've run into current or former black hats. But some of these hackers have put their dark pasts behind them and are doing great things in the world cyber security research today. The big question is should an...
Jeff Edwards | | Security
I’ve said it before and I’ll say it again: We are living in the age of the data breach. Now more than ever, our lives are defined by the massive data sets built from our online presence, and now more than ever, they are routinely disrupted when those data sets fall into...
Jeff Edwards | | IT Insights | Security
Understanding and complying with data protection and privacy regulations is hard enough. With all of the jargon and acronyms thrown around, it can sometimes feel like lawyers and regulators don't want you to understand. Fear not, we've put together a comprehensive data...
The EU’s PSD2 directive (a revised payment service directive) aims to regulate electronic payments in EU member countries. It has no impact on traditional paper-based transactions.
Greg Mooney | | Security
If you are doing business in Australia, then you will need to study up on the Federal Privacy Act 1988 and its underlying principles.
Jeff Edwards | | IT Insights | Security
In this post, we’ll break down Brazil’s General Data Protection Law—who needs to comply, what is protected, and how to meet its requirements.
Greg Mooney | | Security
Many years since the initial publication of ISO 20022, more and more financial firms are beginning to leverage the standard.
Adam Bertram | | Security
The Windows event logs are a great place to start when troubleshooting problems or investigating potential security breaches.
Mobile devices are one of the weakest links in cyber security for businesses, yet very little is being done to mitigate the risks around these top 5 types of mobile device breaches.
Jeff Edwards | | IT Insights | Security
In this article, we'll answer some of the most common questions about the CSL, and make compliance goals as clear as possible.
Greg Mooney | | IT Insights | Security
MiFID II signifies the continuing onslaught of financial market regulations that demand transaction transparency. Such regulations burden compliance and IT teams who have to ensure their companies meet increasingly stringent security standards.
Businesses have steadily improved their perimeter security to better protect against an ever increasing number of cyber attacks. This has left hackers to look for other, less challenging paths to an enterprise’s data in 3rd party APIs.
Security breaches are occurring at an alarming rate as cybercriminals continue to successfully infiltrate the IT infrastructures of organizations across many industries.
Jeff Edwards | | IT Insights | Security
With the EU’s General Data Protection Regulation (GDPR) now in effect, GDPR preparedness should be top of mind for businesses everywhere, not just those based in the European Union (EU). This GDPR overview will take you through the basics, including the seven principles...
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.