Let’s Encrypt is the free HTTPS encryption service that is used by millions of web sites. Since it started out as a good idea of two Mozilla employees in 2012, it has issued about 2 billion free TLS certificates. The history behind this organization is long and convoluted. The industry has a high bar for […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While goals are CURRENTLY voluntary, CISA issued guidelines for what it expects from pipelines and other critical infrastructure in light of the Colonial Pipeline attack. While it appears that the hackers were not able to take over the control systems in that attack, they did take over the control systems in the Florida and Kansas […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Domain registrar Epik is known for hosting certain types of domains. They call themselves the Swiss Bank of Domains – neutral in the political fights. They host the domains for right wing sites like Parler and Gab and political sites like Texas Right to Life and the Texas GOP, among many others. The company confirmed […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While the details of this are interesting, what is more important is thinking about all of the contracts that you sign. This is a legal battle that goes back several years. In one corner is Fiserv, the Fortune 200 +/- financial services software behemouth. In the other corner is Bessemer System Federal Credit Union, a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Apple has always said that they are privacy focused and they usually are except when they are not. Here is a case where they are and if you do email marketing, it is going to spell trouble. Version 15 of the iPhone, Mac and Watch OSes are coming out on September 20th. For users of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
IBM’s security arm, X-Force, released their latest Cloud Security Threat Landscape report for Q2 2020 to Q2 2021. They said that two out of three breached cloud environments observed by them would likely have been prevented by more robust hardening of systems, such as better software security practices (called policies) and better patching. They also […]
Continue reading →
[DISPLAY_ACURAX_ICONS]