There is no silver bullet when it comes to securing “the” Internet of Things, instead, a careful analysis of the individual application is needed. In this article we explore a methodical, yet pragmatic approach to securing IOT devices.
Read moreThere is no silver bullet when it comes to securing “the” Internet of Things, instead, a careful analysis of the individual application is needed. In this article we explore a methodical, yet pragmatic approach to securing IOT devices.
Read moreThe business world today is built on the pervasive use of cryptography, to authenticate people and processes, to secure communications, and to protect sensitive data.
Read moreWhen migrating their business-critical applications and cryptography to the cloud, banks and financial institutions face a number of concerns. The push to adopt cloud computing for the sake of efficiency and innovation must be balanced with the responsibility to protect sensitive data and processes.
Read moreThe first practical chosen-prefix collision attack on SHA-1 was announced in January 2020 by researchers Gaëtan Leurent and Thomas Peyrin: “SHA-1 is a Shambles”.
Read more