Articles by

Megha Thakkar

What Is a CRL? A Certificate Revocation List Explained

In 2014, Mozilla moved away from using certificate revocation lists (CRLs) to check the validity of TLS...

Why Using a Password Salt and Hash Makes for Better Security

The Imperva Bad Bot Report 2021 revealed that 34% of all login attempts are malicious bots attempting...

SHA 256 Algorithm Explained by a Cyber Security Consultant

The SHA 256 algorithm is the industry-standard hashing algorithm for file and data integrity. But what...

What Is Passwordless SSH? A Look at SSH Passwordless Authentication

With the rise of remote work in the age of the epidemic, exposure to remote desktop (RDP)...

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!