SSLTrust Cyber Security Blog | Page 3

Back to Blog Homepage
#Guides

OpenSSL 3.0: What you should know

OpenSSL 3.0 has been released, and with it there are some notable changes to the popular library used almost everywhere for implementing SSL/TLS. As of now, the OpenSSL 1.1.1 branch is still under active development, so while it’s worth evaluating …

#Articles

How to get a job in Cyber Security. Without a degree!

So, you want a job in cyber security? It can be daunting trying to land your first job in a new industry, whether it’s a career change, your first job out of high school, or getting work in the industry while at university. The cyber-security …

#Articles

How do Cyber Criminals get your account details?

Hackers are smart and lazy. Who would want to sit at a computer all day typing away guessing passwords? Not me. They say that lazy people are often the innovators of our society, thinking of ways to do things that require minimal time and effort. …

#Articles

What is FIPS compliance?

FIPS (Federal Information Processing Standard) is a set of requirements asserted by NIST in order to centralize and make uniform the ways in which the US government manage the risks associated with securing and transporting sensitive information. …

#Articles

Considering Full Disk Encryption (FDE)

Full Disk Encryption (FDE) refers to the practice of encrypting a device (laptop, cell phone, etc) at-rest. Decryption is performed at boot time, relying on user input, a cryptographic key stored in hardware, or a combination both. FDE is an …

#Guides

How to choose the right encryption

It can be very difficult to bridge the gap between the theoretical and the practical. This is a pattern I’ve seen repeat itself again and again throughout my career – someone might be very technical, and very familiar with encryption, but when it …

#Articles

PBKDF2: Password Based Key Derivation

PBKDF2, defined in RFC 2898, is a specific Key Derivation Function (KDF). A KDF is simply any mechanism for taking a password (something a user remembers or stores in a password manager) and turning it into a symmetric key suitable for cryptographic …

#Guides

How Certificate Revocation Works with CRLs and OCSP

Certificate Revocation refers to the act of canceling a signed certificate before its expiration date. This can be done due to private key compromise, retirement of a service, or various administrative reasons. There are many different approaches …

#Articles

Encryption vs Hashing: What’s the difference?

Both Encryption and Hashing are fundamental building blocks of cryptosystems. When it comes to best practices for storing credentials in your application however, best practice is largely driven by what you’re trying to do. There are a lot of …

You may be also interested in reading our other resources...

Learning Centre

View more resources on cyber security, encryption and the internet.

Helpful Guides

View more Guides, FAQs and information to help with your Certificate purchases.