Blog

94 Results / Page 3 of 10

todayFebruary 23, 2022

close

Blockchain Security + blog Z. Oualid

What is the difference between PoW and PoS?

Some of the most popular consensus algorithms are Proof of Work and Proof of stack. Those algorithms have proven their efficiency and security over time after years of being implemented in the most known Blockchain. Therefore, what is the difference between PoW and PoS? Proof of stake is a consensus ...

The best consensus algorithm

todayFebruary 18, 2022

close

Blockchain Security + blog Z. Oualid

What is the best consensus algorithm?

When building a Blockchain solution for a company or an organization, one of the decisions that the architecture may need to take, is choosing a consensus algorithm. So what is the best consensus algorithm? The best consensus algorithms that suit a permissioned Blockchain are the PBFT, IBFT as they are ...

todayFebruary 12, 2022

close

Blockchain Security + blog Z. Oualid

What are the three types of Blockchain?

When we start talking about securing Blockchain technology, people always think about Bitcoin. However, Bitcoin is only one implementation of one of the Blockchain types. Therefore, to be able to correctly secure those systems you should understand the characteristics of each Blockchain type. So what are the three types of ...

todayFebruary 3, 2022

close

blog + Blockchain Security Z. Oualid

What are the six layers of blockchain technology?

Blockchain is the new trending technology in the market, many companies start to implement it to solve multiple problems. Usually, this technology manages the different types of user information related to their money. Therefore, to secure this technology you should first understand how it works. Blockchain technology can be seen ...

todayOctober 21, 2021

close

blog + security solutions Z. Oualid

How can Nessus protect an enterprise?

One of the requirements to become compliant with known standards and laws in cybersecurity is to have a vulnerability scanner. Nessus is one of the most popular ones among all the other vulnerability scanners in the market. However, when talking about the technical benefits of a Nessus a lot of ...

Vulnerability scanner

todayOctober 15, 2021

close

blog + security solutions + Website security Z. Oualid

Is Acunetix safe ?

Acunetix is one of the most popular web application vulnerability scanners in the market. It is known for its quick scans and a number of features that make it suitable for standards and laws compliance. However, a lot of people ask if Acunetix is safe? Acunetix is not a safe ...

using components with known vulnerabilities

todayOctober 15, 2021

close

WordPress + blog + secure coding + DevSecOps + Website security + OWASP TOP 10 Z. Oualid

Using Components with Known Vulnerabilities prevention

With the race to make software development even faster, companies start to adopt a new way technique based on using already developed code components. Unfortunately, this development technique comes with many security vulnerabilities that have made the software even less secure regardless of the enhancement the used development technology has ...

supply chain attack prevention

todayOctober 15, 2021

close

blog + Website security Z. Oualid

Website supply chain attack prevention

One of the most critical and dangerous cyberattacks that any website could be vulnerable to is the supply chain attack. Those types of attacks are very difficult to detect and stop as they exploit the trust relationships between the supplier and his clients. So how to prevent a supply chain ...