logo.png
GET GDPR READY

Foregenix Blog

Andrew McKenna

Your Encryption Checklist

Encryption

,12/01/18 10:14

 

 

Encryption is one of the foundations of keeping data secure, if a hacker can't read the information they've stolen, it's useless. Storing unencrypted cardholder data in any part of your website is asking for trouble. Hackers know what to look for and where to find it, so you need to ensure you're encrypting data.  

Based on real and potential weaknesses identified in existing security protocols as well as industry guidance on algorithms, the following are some things to bear in mind when considering your business’ plans for encryption in 2018.

Read More
David Kirkpatrick

Penetration Testing: The Quest For Fully UnDetectable Malware

Malware continues to be one of the main attack vectors used by criminals to compromise user and corporate data. Using phishing or social engineering based attacks, criminals attempt to lure an unsuspecting victim into launching a malicious piece of code. It can then do anything from sit in the background as a zombie waiting for the next instruction, or something more sinister, such as lock your computer and demand payment. This is something we've  seen in the recent NHS WannaCry and Petya/NotPetya ransomware breakouts (as badly orchestrated as they may both have been).

Read More
Andrew McKenna

Encryption 102: 5 Methods of Encryption (Part 2)

PCI, PA-DSS and P2PE, Encryption

,07/12/16 16:02

Following on from Encryption 101, this post will focus on different methods of Encryption, when they're applicable and why they are important. 

Read More
Andrew McKenna

Your Encryption Checklist

Encryption

,12/01/18 10:14

 

 

Encryption is one of the foundations of keeping data secure, if a hacker can't read the information they've stolen, it's useless. Storing unencrypted cardholder data in any part of your website is asking for trouble. Hackers know what to look for and where to find it, so you need to ensure you're encrypting data.  

Based on real and potential weaknesses identified in existing security protocols as well as industry guidance on algorithms, the following are some things to bear in mind when considering your business’ plans for encryption in 2018.

Read More
David Kirkpatrick

Penetration Testing: The Quest For Fully UnDetectable Malware

Malware continues to be one of the main attack vectors used by criminals to compromise user and corporate data. Using phishing or social engineering based attacks, criminals attempt to lure an unsuspecting victim into launching a malicious piece of code. It can then do anything from sit in the background as a zombie waiting for the next instruction, or something more sinister, such as lock your computer and demand payment. This is something we've  seen in the recent NHS WannaCry and Petya/NotPetya ransomware breakouts (as badly orchestrated as they may both have been).

Read More
Andrew McKenna

Encryption 102: 5 Methods of Encryption (Part 2)

PCI, PA-DSS and P2PE, Encryption

,07/12/16 16:02

Following on from Encryption 101, this post will focus on different methods of Encryption, when they're applicable and why they are important. 

Read More

Cyber Security Insights

Jake Dennys
16/07/18 11:38

Stronger and more frequent Brute Force Attacks are now the norm

Brute force attacks have plagued the internet for years. It’s a fairly simple concept; attempt every combination of words/numbers until the right one ...

Read More

Jake Dennys
11/07/18 10:31

Foregenix Place #4 In The Growth 100!

It’s been an exciting year for us, awarded consultancy practice of the year and best tech security; then named in the Sunday Times Export Track 100 ...

Read More

Jake Dennys
09/07/18 09:47

Digital Forensics in the Asia-Pacific region

As a global cybersecurity company, we are constantly striving to provide a better service for our clients. We are happy to report that our Digital ...

Read More

Jake Dennys
05/07/18 09:57

Foregenix take Consultancy Practice of the year at the Cyber Security Awards!

  We have been lucky enough to be awarded Consultancy Practice of the year! We've had a good year so far for awards, being recognised for the work we ...

Read More

Dan Ball
19/06/18 13:48

Getting to Grips With the Australian Notifiable Data Breaches Scheme.

In light of the Notifiable Data Breaches (NDB) scheme which came into effect in Australia on 22nd February 2018, Foregenix has launched three service ...

Read More