Cybersecurity
Threatlocker Zero Trust Success Story of Airiam
Threatlocker is a zero trust protection platform. This platform provides enterprise level cyber security. With this platform you can allow only what you need to have on your systems and…
Read moreWhat Is SOC 2 Compliance In Terms Of Technology
Service Organization Control 2, known as SOC 2 for short, compliance in relation to technology has to do with how service organizations manage and secure customer data, in particular when…
Read moreOkta breached again due to past breaches
Identity management platform Okta, on October 20th 2023, said it had suffered another breach in its customer support system. As a company that deals with access and authentication services, when…
Read moreWhen Should mTLS Be Used & When Should It Not Be Used?
If you are looking to adopt a zero trust security posture, mTLS is a must have when it comes to network communications between various application components that you manage as…
Read moreWhat Sets mTLS Apart From TLS and SSL?
mTLS is an extension of the security provided by TLS. This is done by adding mutual authentication between the client and the server. When using mTLS, both the client and…
Read moreHow Does mTLS Work?
What makes mTLS different to standard TLS is that it is two ways. It is also helpful to understand how TLS on its own works using the public key cryptography…
Read moreWhat is mTLS?
A variation of the transport layer security (TLS), there is mutual TLS (mTLS). TLS is the successor to secure sockets layer (SSL) and is the most widely deployed standard for…
Read moreWhy Is mTLS Needed?
mTLS is an important component of a zero trust architecture. One of the principles of zero trust networking is to assume that there is an attacker that has infiltrated your…
Read moreHow Is mTLS Implemented?
Proving Identity Is The Hardest Part of mTLS mTLS has significant security advantages, but it also has some implementation challenges such as the establishment of secure mechanisms for services to…
Read moreRocket Alert App Spoofed, Targets Israeli Android Users With Malware
With a war raging between Hamas and Israel, there seems to be a war also being raged in cyberspace that is continuing to emerge. As soon as the first gruesome…
Read more