PowerDNS Master-Slave Configuration with DNSSEC Support

Introduction This guide provides a detailed walk-through for setting up a PowerDNS master-slave configuration on Debian 12, including installation, configuration, DNSSEC support, and implementation of automatic zone management and import scripts. This setup is ideal for managing multiple DNS zones with automatic replication between servers, efficient zone imports, and secureContinue Reading

Redis ACL – Access Control List

The Redis ACL, short for Access Control List, is the feature that allows certain connections to be limited in terms of the commands that can be executed and the keys that can be accessed. The way it works is that, after connecting, a client is required to provide a usernameContinue Reading

Signature Verification: How to Verify a Digital Signature Online

Digital signatures add another layer of security to your online transactions and communications. But how can you know they’re real? We’ll walk you through how to verify a digital signature online in several popular systems and email clients Digital signatures, unlike electronic signatures, can be cryptographically proven. This enables recipientsContinue Reading

‘World Quantum Readiness Day’ Returns with the Latest in PQC

Sept. 10: Get actionable insights from 20+ global experts as they discuss PQC readiness assessments, migration plans, and other practical strategies DigiCert is hosting its second annual World Quantum Readiness Day on Wednesday, Sept. 10, 2025. This two-hour webinar, themed “Quantum Blueprint: From Business Justification to Technical Readiness,” will featureContinue Reading

Email Certificate Standards Updated to Support ACME Automation & Future PQC Security

Changes to the S/MIME Certificate Baseline Requirements add support for automated mailbox validation (via the ACME protocol) and post-quantum cryptography algorithm testing July 2025 was a busy period in the CA/Brower Forum’s (CABF) S/MIME Certificate Working Group (SMCWG). There are two key ballots relating to S/MIME certificates that have beenContinue Reading

Critical Infrastructure Protection: Securing Essential Systems Against Cyber Threats

From cyber attacks on emergency call centers to electric and telecom network infiltrations, here’s what to know about the threats plaguing critical infrastructure sectors and how to fight back “We’re sorry, the number you are calling is not available.” Service outages can bring emergency services like 911 to a standstill.Continue Reading