How do you assess the robustness of an encryption solution?

Highlights

Encryption ABC's

5 preconceived ideas about encryption!

Too many preconceived ideas about encryption stop companies from taking action. Such reticence can be costly when sensitive data is leaked and disclosed. A look at five stubborn misconceptions...

Learn more

Tech culture

How do you assess the robustness of an encryption solution?

To assess the robustness of an encryption system, it is essential to examine several technical aspects of the solution itself, as well as its integration, to avoid implementation errors. It…

Learn more

Tech culture

The essential tools for a successful Zero Trust strategy

Do you want to set up Zero Trust in your organization? Building a solid Zero Trust strategy means building in and coordinating different technologies. These make it possible to check…

Learn more

Tech culture

Cybersecurity: the threats are multiple, how do we tackle them?

The threats are not limited to direct attacks on company information systems. They can also come from compromised subcontractors or employee negligence. A comprehensive encryption strategy is the key to…

Learn more

Encryption ABC's Tech culture

Choosing and managing encryption keys

Encryption keys play a crucial role in data security. Well-chosen and properly managed keys protect sensitive information from unauthorized access and the risk of compromise. It is therefore essential to…

Learn more

Tech culture

What cybersecurity in a post-quantum world?

With the new computational capabilities provided by quantum technology, cryptography will enter a new dimension. But this power can also fall into the hands of cybercriminals or rogue states. So…

Learn more

Tech culture

AI and cybersecurity: marketing pitch or true progress?

For now, artificial intelligence's contribution to cybersecurity solutions is limited to the detection of advanced threats. AI isn’t able to automate incident response yet. The reliability of algorithmic models is…

Learn more

Tech culture

DPOs and CISOs what are the synergies?

Two key professions in the administration of organizations have emerged in recent years: the Chief Information Security Officer (CISO) - due to the growing pressure from cyber-attacks - and the…

Learn more

Tech culture

Symmetric and asymmetric: why two types of encryption?

Encryption is one of the solutions to protect yourself and guarantee confidentiality. There are actually two main families: asymmetric encryption (e.g.: RSA, ECDSA) and symmetric encryption (e.g: AES-256). Each has…

Learn more

Tech culture

How to secure a thumb drive or an external hard drive?

Knowing that USB devices (thumb drive, external hard drive) as well as memory cards (SD cards) are easy to duplicate, steal or lose. It’s imperative to define a strategy to…

Learn more

Tech culture

Data: a valuable asset to protect using encryption

Although it doesn’t feature on balance sheets (yet), collected and stored data is a very important asset which must be protected. To understand that, you just have to look at…

Learn more