SSL Certificates

SSL Certificates Get Shorter, but Why?

As a cybersecurity practitioner, you have probably observed something odd in recent years: SSL certificate validity periods have dropped dramatically. You may have created an SSL certificate five years ago and left it valid for five years without having to pay any attention. Right now, it can only be issued for one year. These developments are compiled on a timeline below:

Read More
Digital Signature, Digital Signing, Document Signing,

Understanding the Importance of Digital Signatures in Modern Business Transactions

Digital signatures are a fundamental part of modern transactions in today’s fast-paced world, where efficiency and security are everything. They streamline company processes, from signing contracts to approving financial documents, making them faster, more secure, and more transparent. So, what makes digital signatures so important, and how do they benefit the business? Let’s break it down. What is a Digital Signature?

Read More
at work, cloud data, cloud security, breaches, misconfiguration, cloud computing,

Cloud Data Breaches: Common Misconfigurations and How to Prevent Them

The cloud has become an essential tool for many businesses today, as the digital world is growing quickly. Cloud computing greatly improves the efficiency of resource and data management. Additionally, it greatly facilitates business or operational scaling. As most companies are going to the cloud, this may lead to issues with cloud data security. Everyone is aware that reports of data

Read More
PKI

Common Pitfalls in PKI Management and How to Avoid Them

Public Key Infrastructure (PKI) plays a vital role in the digital security world, from keeping online communications private to verifying identities and protecting sensitive data. However, as digital demands increase, PKI management can get complicated, leading to expensive mistakes, security risks, and even service disruptions if not handled carefully. We will look at some common PKI management challenges and practical ways

Read More
Ashok at Work with SSL

SSL Certificates: Verification & Differences between DV, OV, and EV Certificates

In today’s digital landscape, SSL Certificates are crucial for securing online communications by encrypting data exchanged between web browsers and servers. They help protect sensitive information, such as passwords and credit card details, from unauthorised access. Understanding the differences between Domain Validated (DV), Organization Validated (OV), and Extended Validation (EV) Certificates—along with their verification processes—is essential for enhancing security and building

Read More
Risk Management, Risk Assessment Risk Lifecycle, Plan, Identify, Analysis, Responses, Monitor

Introduction to Risk Management

In this blog, I will share the idea of Risk Management with you. Before we go into what Risk Management is about, let’s look into what is considered a risk. A risk is an uncertain event that could have a positive or negative effect on your project with a probability between 1% to 99% that the event could occur. There is

Read More
Louis at work HSM

What is a Hardware Security Module (HSM)?

In today’s digital age, securing sensitive data cannot be overstated. From financial institutions to government agencies, protecting information from unauthorised access is crucial. One of the most robust tools in the arsenal of cybersecurity is the Hardware Security Module (HSM). But what exactly is an HSM, and how does it safeguard critical data? Moreover, how does it differ from Key Management

Read More

Our data privacy in this day and age with AI: Machine Learning

The AI Race: How Facebook, Google, and Tech Giants are Shaping the Future In today’s rapidly evolving tech landscape, Artificial Intelligence (AI) stands at the forefront of innovation, with industry leaders like Facebook and Google spearheading groundbreaking advancements. These tech giants are investing billions into AI research and development to revolutionise sectors ranging from social media and search engines to healthcare

Read More
Certification Authority Browser Forum

Understanding CA/B Forum: Securing the Web, One Certificate at a Time

In the vast landscape of cybersecurity, one crucial element stands out – digital certificates. These small data files authenticate the identities of websites, ensuring secure connections between users and web servers. At the heart of this system lies the Certification Authority/Browser Forum (CA/B Forum), a consortium of industry leaders dedicated to enhancing the security and reliability of the internet. Understanding the

Read More

The Basics of OpenID Connect (OIDC)

Singpass login has become the de-facto option for authentication for Singapore residents. Given the ease at which a user can authenticate with Singpass, it is the obvious choice when presented with multiple login options on a site.  Singpass uses a protocol called OpenID Connect(OIDC) to achieve this seamless and secure authentication session with our applications. How exactly does your application use

Read More