Category: Cybersecurity

Electronic vs Digital Signatures

Electronic vs Digital Signatures

Some time ago, I posted about certificate authentication, and certificates themselves. In those articles, I mentioned digital signatures and made a really small mention that digital and electronic signatures are two very different things. In this article, let's unpack...

read more
Securing WordPress with Cloudflare Access

Securing WordPress with Cloudflare Access

Quite some time ago, I posted about my use of Cloudflare's edge services to protect my WordPress installations. I still use and recommend Cloudflare as a frontend to all of your public facing (or even not public facing, future post coming) web assets. Even on the free...

read more
To IaaS or not to IaaS?

To IaaS or not to IaaS?

IaaS (Infrastructure as a Service) might just be the cloud in its purest form. It truly is just "renting someone else's" computer. Because of that, IaaS offers a ton of flexibility, but it comes with a catch. So let's explore the question: should my cloud...

read more
Supply Chain Attacks: On the Rise

Supply Chain Attacks: On the Rise

The 3CX incident marked another highly successful supply chain-based attack, believed to be attributable to DPRK (North Korea) state sponsored actors. I won't bore you with the nerdy details, because Huntress and Blackpoint have already done a fantastic job at that. I...

read more