Sam Bocetta
Recent Posts
-
Enhancing Email Security with S/MIME Digital Certificates
November 14, 2024Explore how S/MIME improves email security and discover best practices for implementation,…
-
Mitigating Cyber Risks in Healthcare with Digital Certificates
October 15, 2024Discover how the use of digital certificates, particularly SSL, protect sensitive data within the…
-
Securing the Automotive Industry: The Role of Digital Certificates in Connected Vehicles
April 22, 2024Connected vehicles are becoming more common but also bring new risks. The auto industry must…
-
Digital Identity in the Age of Remote Work: A New Frontier for Cyber Security
April 11, 2024This blog navigates new standards for cybersecurity in the age of remote and hybrid working,…
-
A Demo of Biometric Tech Has Begun: Expanding the Adoption of Remote Identity Verification
August 04, 2023In this article, we will explore the types of biometric tech and how it is expanding the adoption of…
-
Biometric Authentication: The Good, the Bad, and the Ugly
July 07, 2023This article will look at what biometric authentication is and what it is used for.
-
Mitigating Weaknesses in Microsoft Active Directory Certificate Services
June 15, 2023In this blog, we investigate the security vulnerabilities of Microsoft Active Directory, and explore…
-
How IoT Has Continued To Evolve in the Post-Pandemic Market
April 12, 2023It has been over 3 years since the pandemic accelerated technological developments and sparked new…
-
6 Medical Devices Hackers Like to Target and Why
January 12, 2023Every industry is now at constant risk of a data breach, or criminals accessing their network and…
-
Aviation Starting to Get Hit with Rise of Cyberattacks Post-Pandemic
November 21, 2022Threat actors are turning their attention to the aviation industry post-pandemic, but what…
-
The Risk of Cybersecurity Threats Continues To Grow for the Auto Industry
November 14, 2022Discover the latest innovations driving the risk of cyberattacks in the auto industry, plus the…
-
Preventing Data Breaches: 10 Tactics Every Company Should Implement
October 05, 2022Preventing data breaches is key to ensuring your business is protected. With the average cost of a…
-
Why mTLS Should Be Everywhere in Kubernetes and Not Just Entry and Exit
May 31, 2022There are many steps companies can take to secure their Kubernetes workloads. One best practice that…
-
Quantum Resistant Encryption: What is it & Why It’s Critical to Future Cybersecurity
May 12, 2022Quantum computers are advancing quickly. Posing a great risk in the future as they will allow…
-
How to Use and Automate PKI in DevOps?
April 05, 2022PKI is one of the most reliable security authentication tools. But how do we streamline and…
-
How Businesses Can Embrace Automation in Their Data Privacy Practices
September 09, 2021Now more than ever, businesses rely on data and technology to scale their operations. But with the…
-
Understanding Why SSL/TLS Certificates Are Essential for Securing Mobile Applications
October 14, 2020In this article, we’ll discuss why mobile application security is so crucial today, along with…
-
ETSI's New Cybersecurity Standards Establish a Security Baseline for IoT Devices
August 11, 2020In today’s blog, we’ll cover the European Telecommunications Standards Institute’s (ETSI) new…
-
Spear Phishing and Coronavirus – How to Protect Yourself and Your Company
July 31, 2020Spear phishing is on the rise as cyber criminals have begun impersonating Google to trick remote…
-
Hands-Free Everything? The Coronavirus Impact on IoT
July 10, 2020More sectors and industries will look to IoT going forward to entice customers, expand their brands,…
-
Digital Contact Tracing: Advantages and Disadvantages
July 02, 2020As governments around the world continue to face the escalating crisis and come up with pandemic…
-
US Elections 2020: Effectively Balancing Access and Security
June 18, 2020In this piece, we’ll dive into exactly how America’s electoral integrity is at risk due to cyber…
-
Cloud Security: Top 3 Threats and How to Address Them
June 08, 2020In this article, we will identify three specific cloud security threats and what should be done to…
-
Don’t Underestimate the 5G Impact on Just About Everything
May 29, 2020The connectivity of the world is moving at break-neck speeds. The next evolutionary step in this…
-
Coronavirus and Cybersecurity: 3 Essential Precautions for Enterprises
March 20, 2020The Coronavirus is changing everything. Amid talk of social distancing, quarantine, and stock market…