FAQ
How Quantum Computing Works
In this video you will see how Quantum Computing works, and how it work being fundamentally different to standard computing. https://www.youtube.com/watch?v=uLnGp1WTNFQ
Read moreWhat Sets mTLS Apart From TLS and SSL?
mTLS is an extension of the security provided by TLS. This is done by adding mutual authentication between the client and the server. When using mTLS, both the client and…
Read moreHow Does mTLS Work?
What makes mTLS different to standard TLS is that it is two ways. It is also helpful to understand how TLS on its own works using the public key cryptography…
Read moreWhat is mTLS?
A variation of the transport layer security (TLS), there is mutual TLS (mTLS). TLS is the successor to secure sockets layer (SSL) and is the most widely deployed standard for…
Read moreFAQ – What Is The Lifecycle Of A Ransomware Incident?
It is important to understand the various stages of a ransomware attack. This is key to knowing how one can defend against them. In this Netsurion video it shows us…
Read moreWhy Is mTLS Needed?
mTLS is an important component of a zero trust architecture. One of the principles of zero trust networking is to assume that there is an attacker that has infiltrated your…
Read moreHow Is mTLS Implemented?
Proving Identity Is The Hardest Part of mTLS mTLS has significant security advantages, but it also has some implementation challenges such as the establishment of secure mechanisms for services to…
Read moreFAQ – What Is An Effective Defence Against Ransomware Attacks?
Sadly there is no one size fits all solution that will protect you against ransomware attacks. Using a proactive and layered approach to security will limit the chance of a…
Read moreFAQ – Who Carries Out Ransomware Attacks?
Ransomware attacks are carried out by threat actors. They used to be classified into two types of threat actors - Criminal Gang - State Sponsored Group There is now a…
Read moreFAQ – What Policies Are Used When Responding To Ransomware?
There are various frames of thought when it comes to responding to a ransomware attack. One approach is to refuse to pay the ransom, whereas others might be up for…
Read more