Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Encryption

What Is PGP Encryption and How Does It Work?

You’re working late Thursday evening as a contractor for a powerful government agency. You stumble across classified documents uncovering a surveillance program that invades the privacy of millions of citizens. Your heart races as you decide to expose this to the masses and enlist the help of a few journalists. But you also know the organization you work for monitors emails (and other forms of communication). If your emails hit the wrong eyes, you could face severe penalties.

Disable SSLv2: When older is not better

Secure Sockets Layer (SSL) is a technology that encrypts data sent between a user's browser and a website or application on a server. The purpose of SSL is to secure the information preventing eavesdropping and tampering. Originally released in 1995, SSLv2 is a protocol used to encrypt data sent over the internet, ensuring that the information remains private and secure.

5 Steps to Send An Encrypted Email in Gmail

These days, we use Gmail for everything from customer service to telehealth. Over time, your Gmail account might become a treasure trove of sensitive PII, PCI, PHI, and passwords that hackers can leverage. In fact, as of this year, just under half of all data breaches involve email. So, what can you do to protect your inbox? Enter: email encryption.

Encryption at rest in Elastic Cloud: Bring your own key with Azure Key Vault

In the first blog in this series, we unpacked the foundational concepts of encryption at rest and introduced you to Elastic Cloud’s “bring your own key” (BYOK) feature, which allows you to do encryption at rest with encryption keys managed by the KMS service of your cloud provider. The second blog of this series dives into the technical nuances of implementing encryption at rest with AWS KMS keys.

Ensuring Your Privacy: The Critical Role of Security in Choosing a VPN

Among the growing digital threats to privacy, picking out a Virtual Private Network with the right security features makes it very fundamental. The VPN will not only hide your IP address but will go ahead and encrypt your internet connection, thus helping maintain your privacy while online. On the other hand, not all VPNs are created equal. When it comes to the question of what security in a VPN is, it can enable one to make-without question-an informed decision towards guarding one's digital life.

How to Send Encrypted Emails in Gmail in 5 Easy Steps

In today's digital landscape, email encryption is a key component of data protection, especially for organizations that handle personal, financial, or health-related information. Whether you need to safeguard Personally identifiable information (PII), Payment card data (PCI), Protected Health Information (PHI), secrets, or Intellectual Property (IP), this guide will walk you through the process of sending encrypted emails in Gmail.

Encryption at rest in Elastic Cloud: Bring your own key with AWS KMS

In the previous blog of this series, we unpacked the foundational concepts of encryption at rest and introduced you to Elastic Cloud’s “bring your own key” (BYOK) feature, which allows you to do encryption at rest with encryption keys managed by the KMS service of your cloud provider.

Internet Safety at Sea: How to Stay Secure While Cruising

Staying connected while on vacation has never been easier. Even when sailing the ocean waves on a cruise, technology allows us to stay up-to-date with our friends and family, sharing our adventures and staying in touch with loved ones on social media, by email, over messaging and chat applications, and by video.