Tag "Encryption"

Back to homepage

5 reasons passwords are here to stay

Despite biometrics recent rise in popularity, the technology is still not ready to replace traditional passwords.In the last few years we’ve seen biometric authentication go from being the cool tech


Application Security: How to Secure the Many Apps in Your Enterprise

Today’s enterprises are struggling to secure their applications. With thousands of applications in use and new threats emerging daily, large organizations face a monumental task. Compounding matters is the fact


A guide to cyber attacks: Malware – Part 1

As part of a three part guide on cyber attacks, we begin by exploring existing types of malware.Malware, short for malicious software, refers to any malicious coding that can infiltrate


Is there a weak link in your encryption strategy?

Luke Brown, VP EMEA at WinMagic, explains to Information Age what the most common stumbling blocks are when it comes to enterprise encryption. Large or small, companies grapple with keeping


Why Businesses Can’t Ignore Crypto Agility

Today’s encryption algorithms, when pitted against quantum tools, will be considerably less resilient and leave huge amounts of data vulnerable as a result. Experts have been predicting that this may


T-Mobile Data Breach

T-Mobile has experienced another data breach, as reported by TechCrunch.  Hackers stole customer stole names, billing zip codes, phone numbers, email addresses, account numbers, and account type in what the company


How often are users’ DNS queries intercepted?

A group of Chinese researchers wanted to find out just how widespread DNS interception is and has presented the result of their large-scale study to the audience at the Usenix

Industry Insights

What most companies forget when fighting off cyberattacks

Never underestimate the ingenuity and effort that burglars will put into their work. If a team of committed criminals knows that there are untold of riches lying in a bank


Don’t sleep on laptop security, safeguard your data

For many of us, shutting our laptops after a tough day in the office is a satisfying feeling that signals the end of work until tomorrow. But what we don’t


Five key security tips to avoid an IoT hack

Recently, Russian PIR Bank lost $1,000,000 because of a compromised router that allowed hackers to gain entry into their local network. Why did it happen and how companies can protect themselves?  Malicious