Anna Shipman
Bio
Anna Shipman is a Cyber Security Consultant with a strong technical background and experience with a high analytical skillset. She has been involved in the information security industry for more than a decade.
Stories (7/0)
What Is Token Signing and Its Role in Code Signing Process
A token-signing certificate is a quick and straightforward approach to determining whether your private key has been compromised. Or tampered with and also helps to safeguard your online transactions and conversations. The procedures for issuing a token signing certificate from Certificate Authorities (CAs) are different as per the CA process.
By Anna Shipman9 months ago in Geeks
The Significance Of Cyber Security For Business
Cyber Security has become a critical concern for businesses of all sizes in this modern era. With data breaches and cyber attacks increasing day by day, it is essential for companies to prioritize their digital defenses. Every business organization, from smaller to the enterprise level, is vulnerable to cyber threats and attacks.
By Anna Shipman9 months ago in Geeks
What are Certificate Authorities (CA) in Cyber Security?
Certificate Authorities (CA) are an integral part of the Public Key Infrastructure, commonly known as PKI, and are a vital component of cyber security. They are akin to driving license authorities in the physical realm, but in the digital world, they validate corporate identification by authenticating the website, devices, and individuals before issuing any digital security certificate.
By Anna Shipman10 months ago in Geeks
What Is Technical Debt and How to Prevent It Impacting Your Software Security?
Fundamentals of Technical Debt In the fast-paced world of software development, technical debt has become a common and concerning issue. Technical debt refers to the consequences of taking shortcuts, quick fixes, and suboptimal solutions that make trade-offs in software development that developers often take to meet tight deadlines or deliver immediate results. Just like financial debt, technical debt can accumulate over time and lead to long-term consequences for software security.
By Anna Shipman10 months ago in Geeks
What is YubiKey and Why use YubiKey for Code Signing?
To enhance overall security infrastructure, organisations are adopting new security tools like Hardware Security Module (HSM) devices, which are usually tamper-proof and ensure prompt storage of confidential information, security tools or digital documents bolstering data and information security measures for any organisation by reducing the probability of unauthorised accessibility by cyber criminals.
By Anna Shipman11 months ago in Geeks
How to Sign PowerShell Scripts Using a Code Signing Certificate?
PowerShell Code Signing is crucial and the best practice for business organisations using PowerShell scripts that helps to boost operational efficiency. Utilising code signing to sign your PowerShell scripts digitally allows enhanced security, verifying the script is from an authenticated, tamper-free source enabling user trust and they can safely download the signed script on their systems.
By Anna Shipman12 months ago in Geeks
Application Security Best Practices To Prevent Threats
Cybersecurity is becoming one of the most discussed topics in today's business and tech industry. With the heavy dependency on applications, it has become mandatory that users should be ensured that the application they're using is properly secure. Similarly, as a tech security professional, it's also your responsibility that no matter in which computer programming language you've used, some main application security best practices are followed throughout the DevOps lifecycle.
By Anna Shipman2 years ago in Journal