Hardening Systems Against Attacks Like SolarWinds

March 24, 2021 / by Chuck White

How Key Management, PKI Controls, and Zero Trust Principles are Applied to Thwart Advanced Persistent Threats (APTs)

For years, cybersecurity professionals argued the importance of “zero trust networks” and their concerns have been fully validated in the wake of the SolarWinds incident. Hacking techniques likely used in the SolarWinds Sunburst attack include mapping of sIDHistory, Primary Group ID, as well as AdminSDHolder to help identify and obtain cached Active Directory credentials. The compromised SAML keys and cryptographic materials were then likely used to execute administrative control and exfiltrate data over an extended duration.

Read more

RackTop Teams with Fornetix to Create FIPS 140-2 Level 2 Compliant Encrypted Data Storage Solution

July 27, 2017 / by Fornetix

FULTON, Maryland, July 25, 2017 Today, RackTop Systems announced the immediate availability of its advanced secure encryption service with support for external cryptographic key management powered by Fornetix® Key Orchestration™. The enhancement enables organizations to meet strict data-at-rest encryption requirements while providing effortless, unified management of encryption keys. RackTop's advanced encryption service maintains the highest level of protection by eliminating any human interaction or knowledge of keys, pins, or passwords.

Read more

A Primer on FIPS 140-2 Certifications

May 25, 2017 / by Fornetix

Last week, Fornetix attended the International Cryptographic Module Conference outside of Washington D.C. A recurring topic of interest to those in attendance was FIPS 140-2. There were a lot of questions around the topic, so we thought it beneficial to explain the basics of FIPS 140-2 certifications.

Read more
1
Page 1 of 1

Subscribe to Email Updates

Recent Posts