As modern business environment today become more and more interconnected, the need for better and more sophisticated network security is of paramount importance. Simple user authentication systems, based on single username and password are insufficient and are too easily lost, stolen, shared and cracked. More sophisticates user authentication methods such as dynamic password generation, Smart […]
Public Key Infrastructure (PKI) Technology require issuance of digital certificates by the Certificate Authority to each valid user where the digital certificate will be needed whenever the user performing the PKI operations such as Login, Signing, etc. The effectiveness and security of any PKI system rely critically on the security of the certificates or perhaps […]
I have had the opportunity to evaluate two unique solutions for DDoS Mitigation in an effort to find a solution suitable for hosting providers.