BLOG PRIM’X
Encryption and data confidentiality
Highlights
Encryption ABC's
5 preconceived ideas about encryption!
Too many preconceived ideas about encryption stop companies from taking action. Such reticence can be costly when sensitive data is leaked and disclosed. A look at five stubborn misconceptions...
Learn moreTech culture
How do you assess the robustness of an encryption solution?
To assess the robustness of an encryption system, it is essential to examine several technical aspects of the solution itself, as well as its integration, to avoid implementation errors. It…
Learn moreIdeas & initiatives
For software publishers, CVEs guarantee transparency and trustworthiness
What is the first thing businesses do when they start looking for a cybersecurity solution? They look at the list of certifications the publisher has for its solutions. Those certifications…
Learn moreTech culture
The essential tools for a successful Zero Trust strategy
Do you want to set up Zero Trust in your organization? Building a solid Zero Trust strategy means building in and coordinating different technologies. These make it possible to check…
Learn moreExpert interviews Ideas & initiatives
PRIM'X is already mobilizing to counter the quantum threat
The more or less imminent arrival of quantum computers will challenge current cryptographic technology. In response to this new threat, PRIM'X is working on building post-quantum algorithms into its encryption…
Learn moreTech culture
Cybersecurity: the threats are multiple, how do we tackle them?
The threats are not limited to direct attacks on company information systems. They can also come from compromised subcontractors or employee negligence. A comprehensive encryption strategy is the key to…
Learn moreEncryption ABC's Tech culture
Choosing and managing encryption keys
Encryption keys play a crucial role in data security. Well-chosen and properly managed keys protect sensitive information from unauthorized access and the risk of compromise. It is therefore essential to…
Learn moreTech culture
What cybersecurity in a post-quantum world?
With the new computational capabilities provided by quantum technology, cryptography will enter a new dimension. But this power can also fall into the hands of cybercriminals or rogue states. So…
Learn moreIdeas & initiatives
Why must you manage your service providers’ and suppliers’ cyber risks?
Outsourcing is a widespread practice in many sectors: construction, transport, services, etc. It’s also true of IT departments in which many CIOs use service providers to support their in-house teams.
Learn moreEncryption ABC's
The key 5 factors in a successful encryption project
To be effective, encryption strategies must be approached as a whole: It's just as important to protect from external threats as it is to compartmentalize the information system and provide…
Learn moreTech culture
AI and cybersecurity: marketing pitch or true progress?
For now, artificial intelligence's contribution to cybersecurity solutions is limited to the detection of advanced threats. AI isn’t able to automate incident response yet. The reliability of algorithmic models is…
Learn more