Julee SinghinEncryption Consulting BlogsCode Signing ThreatsKnowing the potential threats to code signing is the first step to stopping those threats.Jan 4, 2021Jan 4, 2021
Julee SinghinEncryption Consulting BlogsWhy fix expired SSL certificates?SSL (Secure Socket Layer) provides end-to-end security between the client and server, by establishing a secure channel.Dec 30, 2020Dec 30, 2020
Julee SinghinEncryption Consulting BlogsIntroduction to Homomorphic EncryptionOrganizations nowadays are storing and performing computation of the data on the cloud instead of handling it themselves.Dec 28, 2020Dec 28, 2020
Julee SinghinEncryption Consulting BlogsCloud-Based Public Key Infrastructure (PKI)Public Key Infrastructure (PKI) is mostly about managing secure digital identities that enable ways to protect data.Dec 18, 2020Dec 18, 2020
Julee SinghinEncryption Consulting BlogsDeep Dive into Google Cloud Key Management ServicesIn this article, we will take a closer look at Google’s Cloud Key Management Services.Dec 17, 2020Dec 17, 2020
Julee SinghinEncryption Consulting BlogsDeep Dive on AWS-Key Management ServiceData encryption on the cloud is the most prominent thought every security professional has in their mind these days.Dec 16, 2020Dec 16, 2020
Julee SinghinEncryption Consulting BlogsCompliance and Regulations on CloudCustomers and Cloud Service Provider (CSP) share the responsibility of security and compliance.Dec 15, 2020Dec 15, 2020
Julee SinghinEncryption Consulting BlogsAn Introduction to SSL Cipher SuitesWhen a message is sent across a connection, normally a TLS/SSL connection is used to encrypt the data in the message.Dec 14, 2020Dec 14, 2020
Julee SinghinEncryption Consulting BlogsCode Signing ArchitectureIn the recent past, many technology firms were targeted by hackers to tamper with and corrupt the source code.Dec 7, 2020Dec 7, 2020