Blog

KT Secure - penetration testing, software code signing, hsm management

What is Penetration Testing? A simple Guide

Penetration testing or Pen testing as it is commonly known, is a simulated attack against your infrastructure and systems to check for vulnerabilities that may be exploited by Cyber Attackers.  The NCSC describes penetration testing as “A method for gaining assurance in the security of an IT system by attempting to breach some or all of that system’s security, using the same tools and techniques as an adversary might.” Penetration testing should be a continuous Read more…

KT Secure - penetration testing, software code signing, hsm management

What is a Hardware Security Module (HSM)?

A hardware security module (HSM) is a trusted physical computing device that performs a variety of cryptographic operations, such as signing, signature validation, encryption, decryption and hashing.  Hardware Security Modules typically come in the form of a physical appliance utilising specialised hardware and Operating Systems (OS) connected directly to the network.  USB or PCI connected modules are another option for HSMs and are installed in network connected computers.  Whilst these modules provide much the same Read more…

The Importance of Firewalls

What makes a strong firewall?

In terms of digital security, firewalls are network security systems which are often considered the first line of defence for any infrastructure. Unsure whether your firewall is up to scratch? Take a look at our guide and best practices to get the most out of your firewall.

13 Must Have Steps for GDPR Compliance

GDPR (General Data Protection Regulation) came into effect on 25th May 2018, introducing a complex set of data protection rules that affect every global company that does business with citizens of the European Union. Forbes described the launch of GDPR as been as the “greatest change to European data security in 20 years.” The European Parliament ratified GDPR in April 2016, giving companies just over two years to implement the regulations. Since then, the online Read more…

Data Mapping

What is Data Mapping?

An integral part of your journey towards GDPR compliance is understanding what data you collect, where it is stored and the conditions in which it is stored. Data mapping, also known as a data inventory, this process can be particularly challenging if your organisation does not already have a central map of personal data or if operations span multiple locations.

GDPR Myths Blog

Common Myths of GDPR

With GDPR only a few months away, the number of papers, seminars and news reports available on the new regulation are growing in number. Can you sort the facts from the fiction? We have fact checked some of the most common myths of General Data Protection Regulation (GDPR) in our latest blog.