PKI

Common Pitfalls in PKI Management and How to Avoid Them

Public Key Infrastructure (PKI) plays a vital role in the digital security world, from keeping online communications private to verifying identities and protecting sensitive data. However, as digital demands increase, PKI management can get complicated, leading to expensive mistakes, security risks, and even service disruptions if not handled carefully. We will look at some common PKI management challenges and practical ways

Read More
Ashok at Work with SSL

SSL Certificates: Verification & Differences between DV, OV, and EV Certificates

In today’s digital landscape, SSL Certificates are crucial for securing online communications by encrypting data exchanged between web browsers and servers. They help protect sensitive information, such as passwords and credit card details, from unauthorised access. Understanding the differences between Domain Validated (DV), Organization Validated (OV), and Extended Validation (EV) Certificates—along with their verification processes—is essential for enhancing security and building

Read More
Risk Management, Risk Assessment Risk Lifecycle, Plan, Identify, Analysis, Responses, Monitor

Introduction to Risk Management

In this blog, I will share the idea of Risk Management with you. Before we go into what Risk Management is about, let’s look into what is considered a risk. A risk is an uncertain event that could have a positive or negative effect on your project with a probability between 1% to 99% that the event could occur. There is

Read More
Louis at work HSM

What is a Hardware Security Module (HSM)?

In today’s digital age, securing sensitive data cannot be overstated. From financial institutions to government agencies, protecting information from unauthorised access is crucial. One of the most robust tools in the arsenal of cybersecurity is the Hardware Security Module (HSM). But what exactly is an HSM, and how does it safeguard critical data? Moreover, how does it differ from Key Management

Read More

Our data privacy in this day and age with AI: Machine Learning

The AI Race: How Facebook, Google, and Tech Giants are Shaping the Future In today’s rapidly evolving tech landscape, Artificial Intelligence (AI) stands at the forefront of innovation, with industry leaders like Facebook and Google spearheading groundbreaking advancements. These tech giants are investing billions into AI research and development to revolutionise sectors ranging from social media and search engines to healthcare

Read More
Certification Authority Browser Forum

Understanding CA/B Forum: Securing the Web, One Certificate at a Time

In the vast landscape of cybersecurity, one crucial element stands out – digital certificates. These small data files authenticate the identities of websites, ensuring secure connections between users and web servers. At the heart of this system lies the Certification Authority/Browser Forum (CA/B Forum), a consortium of industry leaders dedicated to enhancing the security and reliability of the internet. Understanding the

Read More

The Basics of OpenID Connect (OIDC)

Singpass login has become the de-facto option for authentication for Singapore residents. Given the ease at which a user can authenticate with Singpass, it is the obvious choice when presented with multiple login options on a site.  Singpass uses a protocol called OpenID Connect(OIDC) to achieve this seamless and secure authentication session with our applications. How exactly does your application use

Read More
At Work, Coding in Progress, HTML, https

nSignBasic Cloud Signing – Icing on the cake

nSignBasic Cloud Signing is a service where Netrust stores the signer’s private key and signs requested documents on the signer’s behalf when authorized. This approach takes the convenience factor up a notch while retaining the security benefits of a USB cryptographic token. With nSignBasic Cloud Signing, anyone can sign any document anywhere anytime. In today’s digital signature landscape, it is normal

Read More

Securing the Foundation: Effective Certificate Management

In an era where digital security is paramount, effective certificate management stands as a cornerstone of safeguarding sensitive data and maintaining trust in online interactions. Digital certificates play a crucial role in establishing secure connections, authenticating identities, and ensuring the confidentiality and integrity of data exchanged over networks. However, managing certificates across diverse environments can be complex and challenging. From SSL/TLS

Read More

Beyond Compliance: How Separate SSL Certificates Boost Software Security

Have you ever considered the security implications of using the same Secure Sockets Layer (SSL) certificate across different software testing and production environments? In today’s fast-changing digital world, ensuring the security of your software is paramount. One often-overlooked aspect of this security is the management of SSL certificates in User Acceptance Testing (UAT) and Production (PROD) environments. Let’s explore why separate

Read More