Blog


Sometimes people fight over same things, because they define them differently.

Cybersecurity, cryptography has come a long way where we use ciphers to protect data and enable encryption. But all these terms are still maturing. That’s why I am writing this blog…..to put a definition to these terms…. Cryptography:

This term is

| Posted by , under Uncategorized

Background: There is a type of certificate called DV certificate. These certificates have a positive security indicator, like a Padlock or “Secure” indicator.

Here is an example of a DV certificate enjoying a security indicator..a green “Secure” with a padlock.

Problem: As you probably have noticed, this is not a PayPal site.

| Posted by , under Uncategorized

And yes, 85 million plus endpoints are immune to ransomware attacks….proof!!!!!

Recent attack that wrecked havoc in Europe is attributed to a ransomware called Wcry (WannaCry).

Problem:

Solution to prevent any Ransomware exists, people are unaware of the solution.

How does Ransomware WannaCry work?:

Once on user computer it wants to: 1)Read

| Posted by , under Uncategorized

Here we are conversing with Ryan at Google, I must admit this has been a very healthy discussion where opinions are expressed and ideas are shared…..and few blogs later we arrive at crossroads……

-Do we (as the computer industry) accelerate investment (I say accelerate as there is already a momentum)

| Posted by , under Uncategorized

We continue to exchange ideas, information and photos… And here is my latest response to the latest response

First of all, the author is unaware that my company has built the most sophisticated Certificate Management system that can automatically request, issue, renew and manage the whole lifecycle of the certificate.