Axnhost.com

Security

Real Photo vs AI-Generated Art: A New Standard (C2PA) Uses PKI to Show an Image’s History

It’s getting harder to tell what’s real and fake online. A new technical standard from Adobe, Microsoft, Sony, DigiCert and dozens of other industry leaders aims to solve this problem. We’re living in a time when the general public no longer feels they can trust what they see, hear, or read in the news or […]

Real Photo vs AI-Generated Art: A New Standard (C2PA) Uses PKI to Show an Image’s History Read More »

Compromised Credentials: 7 Ways to Fight Credential Attacks

92% of cyber security & app development professionals reported to Axiad that they’re worried about compromised credentials stemming from phishing social engineering attacks. Here’s what you can do to strengthen your organization and its secrets against credential attacks.   Credential attacks are a growing issue. Earlier this year, Microsoft Tweeted in a series of five

Compromised Credentials: 7 Ways to Fight Credential Attacks Read More »

What Is API Security & How Do You Achieve It? 10 Essential Methods to Know

Salt’s research shows that 17% of organizations have experienced a breach resulting from an API security gap. Don’t become one of them. Data from Salt underscores why API security (i.e., application programming interface security) is so important. The firm’s State of API Security Report Q1 2023 observes a 400% increase in unique attacks on its

What Is API Security & How Do You Achieve It? 10 Essential Methods to Know Read More »

What Is a CA Certificate? An Overview of These Key PKI Elements

CA certificates are the small digital files that make digital trust, digital identity, and security possible—whether across the internet or within your company network. Certificate authority certificates, or CA certificates, are found virtually everywhere within your organization’s IT environment. In fact, you’ve probably got dozens of them on your computer/device… and you even used several

What Is a CA Certificate? An Overview of These Key PKI Elements Read More »

12 Negative Effects Cyber Attacks & Data Breaches Have on Businesses & Consumers

From organizations paying massive noncompliance fines to consumers shunning companies they perceive as insecure, we’ll break down the impact of cyber attacks on businesses and individuals from businesses’ and consumers’ perspectives. Hardly a day goes by without a new cyber attack or data breach making headlines in the press. It shouldn’t come as a surprise

12 Negative Effects Cyber Attacks & Data Breaches Have on Businesses & Consumers Read More »

How Public Private Key Pairs Work in Cryptography: 5 Common Examples

Step-by-step guides (with illustrations) showing how cryptographic key pairs work in five different public key infrastructure (PKI) scenarios. We know private-public key pairs are used in a multitude of ways (encryption, authentication, digital signatures, etc.) within an IT environment. But the ways they’re used differ dramatically for each use case. This may leave you wondering:

How Public Private Key Pairs Work in Cryptography: 5 Common Examples Read More »

Cryptographic Keys 101: What They Are & How They Secure Data

Compromised cryptographic keys have a devastating effect on any organization — just ask the major Android device manufacturers whose keys were used to distribute malware. Here’s what to know about cryptographic keys, how they work, and how to keep yours secure. Encryption secures everything from the credit card transactions you use to buy items online

Cryptographic Keys 101: What They Are & How They Secure Data Read More »

Data Breach Responsibility & Consequences: Should Execs & Employees Be in the Hot Seat?

Holding executives and employees personally responsible is seemingly gaining traction within IT and cybersecurity communities and global political arenas. Let’s explore a few examples and see what this might mean for the future of cybersecurity. Back in 2009, data from a survey by Websense (now ForcePoint) showed that 30% of 104 security professionals surveyed thought

Data Breach Responsibility & Consequences: Should Execs & Employees Be in the Hot Seat? Read More »