The Role of Access Control in Information Security

Access control systems are everywhere and play a key role in identity and access management (IAM)— let’s break down the different types of access control models & how they work…
The post The Role of Access Control in Information Security appeare… Continue reading The Role of Access Control in Information Security

Symmetric Encryption 101: Definition, How It Works & When It’s Used

Symmetric key encryption is part of virtually everything you do online. We’ll break down everything you need to know about what it is and how and where you’re using it……
The post Symmetric Encryption 101: Definition, How It Works & When It’s Use… Continue reading Symmetric Encryption 101: Definition, How It Works & When It’s Used

What Is a Firewall? Definition, Types & Business Uses

95% of Firemon survey respondents say firewalls are “as critical or more critical than ever” — let’s explore what firewalls are, how they work, and how they help to keep…
The post What Is a Firewall? Definition, Types & Business Uses appeared fi… Continue reading What Is a Firewall? Definition, Types & Business Uses

What Is Smishing? Definition, Examples & Protection Tips

While SMS phishing text scams are nothing new, they’re a type of threat that’s gaining traction with cybercriminals. Proofpoint reports that 84% of organizations faced smishing attacks in 2019 alone……
The post What Is Smishing? Definition, Examples … Continue reading What Is Smishing? Definition, Examples & Protection Tips

Teen Hackers & Cybercrime: Teen Rebellion Ain’t What It Used to Be

From cryptocurrency schemes to shutting down schools — some of the biggest cybercrimes in 2020 and in recent years have been pulled off by individuals who weren’t old enough to…
The post Teen Hackers & Cybercrime: Teen Rebellion Ain’t What It Us… Continue reading Teen Hackers & Cybercrime: Teen Rebellion Ain’t What It Used to Be

Recent Ransomware Attacks: Latest Ransomware Attack News in 2020

We’ll cover 15 of the most recent ransomware attacks (so far) in 2020 — what they were and who they impacted — as well as some of the latest news…
The post Recent Ransomware Attacks: Latest Ransomware Attack News in 2020 appeared first on Hashed Out… Continue reading Recent Ransomware Attacks: Latest Ransomware Attack News in 2020

What Is a Certificate Authority (CA) and What Do They Do?

Every time you visit a website that starts with HTTPS, you’re using a certificate authority. But what exactly is a CA and how does it make your transactions and communications more secure? Let’s hash it out.
The post What Is a Certificate Author… Continue reading What Is a Certificate Authority (CA) and What Do They Do?

What Is a CAA Record? Your Guide to Certificate Authority Authorization

Did you know that there’s an easy way to control which CAs can issue certificates for your domain? Here’s everything to know about CAA records for your DNS.
The post What Is a CAA Record? Your Guide to Certificate Authority Authorization a… Continue reading What Is a CAA Record? Your Guide to Certificate Authority Authorization

Everything You Need to Know About OCSP, OCSP Stapling & OCSP Must-Staple

What happens when a hacker gets an SSL certificate’s private key? The CA revokes it. But how does the browser know whether a website’s certificate has been revoked? OCSP is one way your web client can check…
The post Everything You N… Continue reading Everything You Need to Know About OCSP, OCSP Stapling & OCSP Must-Staple

CRL Explained: What Is a Certificate Revocation List?

Need to revoke a certificate? There’s a list for that… X.509 digital certificates are integral to public key infrastructure (PKI) and web security as a whole. But what happens when…
The post CRL Explained: What Is a Certificate Revocatio… Continue reading CRL Explained: What Is a Certificate Revocation List?