Linux Server Security: 10 Linux Hardening & Security Best Practices

Linux is the most common operating system for web-facing computers. It also runs on three-in-four servers, Netcraft reports. Here’s what to know about Linux.
The post Linux Server Security: 10 Linux Hardening & Security Best Practices appeared fi… Continue reading Linux Server Security: 10 Linux Hardening & Security Best Practices

What Is a CAA Record? Your Guide to Certificate Authority Authorization

Did you know that there’s an easy way to control which CAs can issue certificates for your domain? Here’s everything to know about CAA records for your DNS.
The post What Is a CAA Record? Your Guide to Certificate Authority Authorization a… Continue reading What Is a CAA Record? Your Guide to Certificate Authority Authorization

Everything You Need to Know About OCSP, OCSP Stapling & OCSP Must-Staple

What happens when a hacker gets an SSL certificate’s private key? The CA revokes it. But how does the browser know whether a website’s certificate has been revoked? OCSP is one way your web client can check…
The post Everything You N… Continue reading Everything You Need to Know About OCSP, OCSP Stapling & OCSP Must-Staple

CRL Explained: What Is a Certificate Revocation List?

Need to revoke a certificate? There’s a list for that… X.509 digital certificates are integral to public key infrastructure (PKI) and web security as a whole. But what happens when…
The post CRL Explained: What Is a Certificate Revocatio… Continue reading CRL Explained: What Is a Certificate Revocation List?

Breach and Attack Simulations: How to Find the Gaps in Your Cyber Defenses

Breach and attacks simulations are a popular approach to cyber security testing and defenses. Here’s what to know about BAS technologies and how they work.
The post Breach and Attack Simulations: How to Find the Gaps in Your Cyber Defenses appeared fi… Continue reading Breach and Attack Simulations: How to Find the Gaps in Your Cyber Defenses

New .Gov Domains to Force HTTPS: HSTS Preloading Will Be Enabled Starting Sept. 1

In a move that aims to make all U.S. government websites more secure, the General Services Administration’s DotGov Program announces the migration of government domains to the HSTS preload list starting this fall
The post New .Gov Domains to For… Continue reading New .Gov Domains to Force HTTPS: HSTS Preloading Will Be Enabled Starting Sept. 1

REvil’s Lessons: It’s Time Law Firms Quit Taking Cybersecurity for Granted

More than one-quarter of all law firms have experienced some type of data breach — here’s what your firm needs to know when it faces a cyber or ransomware attack  If you think your law…
The post REvil’… Continue reading REvil’s Lessons: It’s Time Law Firms Quit Taking Cybersecurity for Granted

The Definitive Cyber Security Statistics Guide for 2020

Cyber attacks continue to grow in both numbers and ferocity — 2019 was just a sign of the things to come. Here’s your list of 122 of the most current…
The post The Definitive Cyber Security Statistics Guide for 2020 appeared first on Has… Continue reading The Definitive Cyber Security Statistics Guide for 2020

3-2-1 Backup Rule: The Rule of Thumb to Solve Your Data Loss Problems

Downtime from ransomware attacks results in an average of 16.2 days of downtime for businesses, according to Coveware’s Q4 2019 Ransomware Marketplace report While it may sound like a rule…
The post 3-2-1 Backup Rule: The Rule of Thumb to Solv… Continue reading 3-2-1 Backup Rule: The Rule of Thumb to Solve Your Data Loss Problems