In the age of social networks and various more-or-less secure communication tools, it is hard to be at least basically sure that our communication over the Inernet reaches its recipient in unchanged form and confidentiality of such messages is untouched.

■ ■ ■

Security auditing

Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.

■ ■ ■

Latest posts

Step-by-step Windows key generation process for Thunderbird

In today’s blog post you’ll find how to generate your own set of cryptographic keys and revocation certificate on Windows with Thunderbird email client.  All this information is neatly packed into our step-by-step guide! And if you’re still not sure why would you need cryptographic keys and what is revocation certificate for, we covered those topics here too.

■ ■ ■