top of page
Ruminations
Search
Charles Edge
Oct 29, 20235 min read
Encryption 101: Demystifying the Jargon – Your Guide to Keeping Your Data Safe
From credit card details to embarrassing vacation photos, everything seems to exist in bits and bytes, floating around in the cyber...
14 views0 comments
Charles Edge
Oct 11, 20233 min read
Compliance Corner: Encryption Best Practices for Businesses
In the digital age, data is the lifeblood of every business. However, with great power comes great responsibility.Protecting sensitive...
4 views0 comments
Charles Edge
Oct 11, 20232 min read
Caught in the Breach: What to Do When a Company You Trust Leaks Your Data
In today's digital age, data breaches are unfortunately becoming a common occurrence. From retail giants to healthcare providers, no...
15 views0 comments
Charles Edge
Oct 11, 20233 min read
Choosing a Good SIEM to Secure Any Mac Deployment
A SIEM (Security Information and Event Management) is a security software platform that collects and analyzes data from various security...
17 views0 comments
Charles Edge
Sep 30, 20232 min read
The Silent Threat Within: Detecting and Mitigating Insider Threats
The image of a hoodie-clad hacker breaking into a secure network may be the stereotypical cybersecurity threat, but a much more insidious...
11 views0 comments
Charles Edge
Sep 15, 20232 min read
MDM and Secret Chest
Mobile Device Management, or MDM for short, how most Apple devices are managed en masse. MDM technologies were introduce in the earliest...
14 views0 comments
Charles Edge
Sep 14, 20231 min read
Installing Secret Chest
Secret Chest is currently available through Apple's Test Flight. To install it, you will need to be invited to the beta. Once you have a...
47 views0 comments
Charles Edge
Sep 13, 20231 min read
Delete A Secret In Secret Chest
There are two ways to delete a secret when using Secret Chest. The first is through the app. First open Secret Chest. At the main Secret...
13 views0 comments
Charles Edge
Sep 8, 20232 min read
Securing the Home Front: Essential Encryption Tools for Remote Workers
The shift to remote work has reshaped our professional landscape, offering flexibility and comfort. But with this liberation comes a new...
3 views0 comments
Charles Edge
Sep 1, 20232 min read
When to Add More Plates: Weighing the Merits of New Collections in MongoDB Design
MongoDB's schema-less nature offers a refreshing departure from the rigid table structures of traditional databases. But with this...
3 views0 comments
Charles Edge
Aug 19, 20232 min read
Diving into the Deep End: How VR Headsets Keep Your Digital Identity Safe
Stepping into the immersive world of virtual reality (VR) is thrilling, but with great power comes great responsibility – especially when...
2 views0 comments
Charles Edge
Aug 17, 20234 min read
Use Passkeys With Secret Chest
Passkeys are essentially the answer to the next generation of passwords. They provide a more secure and convenient way to log in to...
21 views0 comments
Charles Edge
Aug 16, 20233 min read
SSH Agents
An SSH key is a pair of cryptographic keys, consisting of a public key and a private key, used for secure communication and...
14 views0 comments
Charles Edge
Aug 16, 20232 min read
Past Breaches, Present Lessons: A Journey Through Hacking History's Darkest Hours
Across the ever-evolving landscape of the internet, countless digital fortresses stand tall, guarding our passwords, identities, and most...
4 views0 comments
Charles Edge
Aug 16, 20234 min read
Building Your Fortress: A Guide to Starting an Information Security Team
Data is now the lifeblood of any organization. Securing it has become not just a necessity, but a strategic imperative. This is where the...
5 views0 comments
Charles Edge
Aug 7, 20233 min read
Swift Treats: Cookies
Cookies are sprung out of Persia in the 600s, around the time of the Muslim conquests of Palestine, Egypt, Armenia, Kabul, Carthage, and...
2 views0 comments
Charles Edge
Jul 26, 20236 min read
Using Webhooks To Orchestrate Events
A webhook is a type of API that allows one application (typically a web application) to send data to another application when a...
103 views0 comments
Charles Edge
Jul 13, 20232 min read
Log Into Secret Chest
Secret Chest supports multiple users on each device. This is because users might have an instance for home and an instance for work....
20 views0 comments
Charles Edge
Jul 11, 20231 min read
Group Management in Secret Chest
Groups are useful in Secret Chest for two main functions. The first is to be able to share secrets to more than one user at a time. The...
11 views0 comments
Charles Edge
Jul 4, 20233 min read
Mastering the Art of Delight: How to Offer Stellar Chat Support for Your SaaS Users
Providing exceptional customer support isn't just a nice-to-have, it's a competitive differentiator. With chat support becoming the...
4 views0 comments
bottom of page