Google Cloud Platform’s Data Loss Prevention API in depth
Posted on23 Jan 2021
Comments0
Read time: 3 minutes 34 seconds Organizations often have to detect, redact, and sometimes encrypt Personally Identifiable Information (PII) or other sensitive data, such as credit card numbers,... Read More
Introduction to Certificate Extension – Basic Constraints
Posted on16 Jan 2021
Comments0
Read time: 5 min Certificate extensions are an integral part of the certificate structure as per X.509 standard for public key certificates. This structure is... Read More
An Introduction to Data Lake Protection
As businesses continually move their services online to services, like Google Cloud Platform (GCP) and Amazon Web Services (AWS), the need to protect this data... Read More
What is an Object Identifier (OID) in a PKI?
Posted on01 Jan 2021
Comments0
Read time: 5 minutes 2 seconds Organizations nowadays are storing and performing computation of the data on the cloud instead of handling themselves. Cloud Service... Read More
Introduction to Homomorphic Encryption
Posted on24 Dec 2020
Comments0
Read time: 5 minutes 2 seconds Organizations nowadays are storing and performing computation of the data on the cloud instead of handling themselves. Cloud Service... Read More
Why fix expired SSL certificates?
Read time: 7 min In today’s Internet world, the image of a green pad lock in the browser is unanimously thought to be a synonym... Read More
An Introduction to SSL Cipher Suites
Posted on12 Dec 2020
Tagscipher suite, cipher suite explained, PKI, tls 1.2 cipher suite, tls cipher suite, tls handshake
Comments0
When a message is sent across a connection, normally a TLS/SSL connection is used to encrypt the data in the message. To create this connection,... Read More
Compliance and Regulations on Cloud
Read time: 04 minutes 22 seconds Customers and Cloud Service Provider (CSP) share the responsibility of security and compliance. Thus, the organization would have the... Read More
Deep Dive on AWS-Key Management Service
Posted on21 Nov 2020
TagsAsymmetric CMK, AWS KMS, BYOK., CMK (Customer Master Key), custom key store, Data encryption, Data Keys, Data-at-rest, Data-in-use, Decrypt, IAM Policies, Key Policies, key store, Symmetric CMK
Comments0
Read Time: 08 min Data encryption on the cloud is the most prominent thought every security professional has in their mind these days. While performing... Read More
Data Encryption on the Cloud and What Tools GCP Provides
Read Time: 07 min. Data encryption, especially on the Cloud, is an extremely important part of any cybersecurity plan in today’s world. More companies migrate... Read More