Categories
IT Security Outsourced IT

Cipher Suites

What are Cipher Suites? Cipher suites are sets of instructions that enable secure network connections through Transport Layer Security (TLS), often still referred to as Secure Sockets Layer (SSL). These cipher suites provide a set of algorithms and protocols that are required to secure communications between clients and servers. To initiate an HTTPS connection, the […]

Categories
IT Security Outsourced IT

Cybersecurity Metrics and Key Performance Indicators

What are Cybersecurity Metrics and KPIs? Cybersecurity metrics and Key Performance Indicators (KPIs) are crucial indicators that help security teams analyze how their security controls function over time. Cybersecurity KPIs and cybersecurity metrics are terms often used interchangeably, but there is a slight difference between their meanings- while cybersecurity metrics are quantifiable measurements pertaining to […]

Categories
IT Security Outsourced IT

Pretty Good Privacy Encryption

What is Pretty Good Privacy Encryption? Pretty Good Privacy (PGP) is a security program used to decrypt and encrypt email and authenticate email messages through digital signatures and file encryption. PGP was one of the first public-key cryptography software applications that was publicly available, for free. Originally, it was used to enable individual users to […]

Categories
IT Security Outsourced IT

Platform Security Architecture

What is Platform Security Architecture? Platform Security Architecture (PSA) is a security certification scheme for Internet of Things (IoT) hardware, software, and devices. It was created by Arm Holdings, Brightsight, CAICT, Prove & Run, Riscure, TrustCB, and UL as part of a global partnership. Arm Holdings first brought forward the PSA specifications in 2017 to […]

Categories
IT Security Outsourced IT

Resource Pooling in Cloud Computing

What is Resource Pooling in Cloud Computing? Resource pooling in a private cloud enables the hypervisor (the software that creates and runs virtual machines) to reassign tenants (the customers who pay for cloud computing services from a cloud provider) to different locations in the cloud to optimize resource usage. In a typical private cloud, the […]

Categories
IT Security Outsourced IT

Root Cause Analysis

What is Root Cause Analysis? The National Institute of Standards and Technology (NIST) defines root cause analysis as, “A principle-based, systems approach for the identification of underlying causes associated with a particular set of risks.”1 In practice, root cause analysis (RCA) can be understood as a method of problem-solving that is used to investigate known […]

Categories
IT Security Outsourced IT

Types of Internet Proxies

What are Internet Proxy Types? Proxy servers receive requests intended for other servers and then act to fulfill, forward, redirect, or reject the requests. Exactly which service is carried out for a particular request is based on a number of factors which include: the proxy server’s capabilities, what is requested, information contained in the request, […]

Categories
Application Security IT Security Outsourced IT

Whitelisting

What is Whitelisting? Whitelisting is a cybersecurity strategy that approves lists of email addresses, IP addresses, applications, and/or domain names, while denying all others, by default. With whitelisting, a user can only take actions on their computer that an administrator has explicitly allowed in advance, because they have deemed those actions to be safe and […]

Categories
IT Security Outsourced IT

Wi-Fi Protected Access

What is Wi-Fi Protected Access? Wi-Fi Protected Access (WPA) is a security standard for computing devices with wireless internet connections. The Institute of Electrical and Electronics Engineers (IEEE) published standards for creating a network in which machines can connect wirelessly in 1997. WPA was developed by the Wi-Fi Alliance to provide better data encryption and […]

Categories
IT Security Outsourced IT

Zero-Knowledge Password Protocol

What is Zero-Knowledge Password Protocol? Zero-knowledge password protocol or zero-knowledge proof (ZKP) is a method in cryptography where one party (the prover) can prove to the other party (the verifier) that he knows the secret information without revealing it. With ZKP, there is no transmission or storage of password/credential details on the authentication server. The […]