SSLTrust

SSLTrust Cyber Security Blog | Page 2

Back to Blog Homepage
#Guides

What Are The Best Practices For Securing Your SaaS?

A single breach could hypothetically compromise wide swathes of sensitive user data. However, modern SaaS usage takes data encryption and security risks extremely seriously, to the point where technology isn't necessarily the most common point of …

#Articles

Alternatives to OpenSSL

For more than 20 years, OpenSSL has been the most widely used SSL/TLS library in use by software applications for cryptographic purposes. OpenSSL is free and open source, which is a huge boon for a library serving as the backbone of a secure …

#Articles

Cyber Security: Is it an ideal career path?

Cybersecurity has become an important part of every organization’s data security strategy; and since its application has only increased, the demand for trained and experienced cybersecurity professionals has also grown rapidly. Even though there are …

#Guides

An Overview of the Essential Eight

News came out in 2021 about the Australian Government mandating the essential 8 Cyber Security controls for all non-corporate Commonwealth entities. This is scheduled to be put into practice starting June 2022 with a compliance audit every 5-years.

#Articles

Exploring Fully Homomorphic Encryption

Fully Homomorphic Encryption (FHE) is the act of operating on an encrypted dataset without first decrypting it. FHE seems at first to be a very abstract concept, but implemented security is both practical and lucrative. The classical example of its …

#Guides

OpenSSL 3.0: What you should know

OpenSSL 3.0 has been released, and with it there are some notable changes to the popular library used almost everywhere for implementing SSL/TLS. As of now, the OpenSSL 1.1.1 branch is still under active development, so while it’s worth evaluating …

#Articles

How to get a job in Cyber Security. Without a degree!

So, you want a job in cyber security? It can be daunting trying to land your first job in a new industry, whether it’s a career change, your first job out of high school, or getting work in the industry while at university. The cyber-security …

#Articles

How do Cyber Criminals get your account details?

Hackers are smart and lazy. Who would want to sit at a computer all day typing away guessing passwords? Not me. They say that lazy people are often the innovators of our society, thinking of ways to do things that require minimal time and effort. …

You may be also interested in reading our other resources...

Learning Center

View more resources on cyber security, encryption and the internet.

Helpful Guides

View more Guides, FAQs and information to help with your Certificate purchases.