How do you assess the robustness of an encryption solution?
Highlights
Encryption ABC's
5 preconceived ideas about encryption!
Too many preconceived ideas about encryption stop companies from taking action. Such reticence can be costly when sensitive data is leaked and disclosed. A look at five stubborn misconceptions...
Learn moreTech culture
How do you assess the robustness of an encryption solution?
To assess the robustness of an encryption system, it is essential to examine several technical aspects of the solution itself, as well as its integration, to avoid implementation errors. It…
Learn moreTech culture
The essential tools for a successful Zero Trust strategy
Do you want to set up Zero Trust in your organization? Building a solid Zero Trust strategy means building in and coordinating different technologies. These make it possible to check…
Learn moreTech culture
Cybersecurity: the threats are multiple, how do we tackle them?
The threats are not limited to direct attacks on company information systems. They can also come from compromised subcontractors or employee negligence. A comprehensive encryption strategy is the key to…
Learn moreEncryption ABC's Tech culture
Choosing and managing encryption keys
Encryption keys play a crucial role in data security. Well-chosen and properly managed keys protect sensitive information from unauthorized access and the risk of compromise. It is therefore essential to…
Learn moreTech culture
What cybersecurity in a post-quantum world?
With the new computational capabilities provided by quantum technology, cryptography will enter a new dimension. But this power can also fall into the hands of cybercriminals or rogue states. So…
Learn moreTech culture
AI and cybersecurity: marketing pitch or true progress?
For now, artificial intelligence's contribution to cybersecurity solutions is limited to the detection of advanced threats. AI isn’t able to automate incident response yet. The reliability of algorithmic models is…
Learn moreTech culture
DPOs and CISOs what are the synergies?
Two key professions in the administration of organizations have emerged in recent years: the Chief Information Security Officer (CISO) - due to the growing pressure from cyber-attacks - and the…
Learn moreTech culture
Symmetric and asymmetric: why two types of encryption?
Encryption is one of the solutions to protect yourself and guarantee confidentiality. There are actually two main families: asymmetric encryption (e.g.: RSA, ECDSA) and symmetric encryption (e.g: AES-256). Each has…
Learn moreTech culture
How to secure a thumb drive or an external hard drive?
Knowing that USB devices (thumb drive, external hard drive) as well as memory cards (SD cards) are easy to duplicate, steal or lose. It’s imperative to define a strategy to…
Learn moreTech culture
Data: a valuable asset to protect using encryption
Although it doesn’t feature on balance sheets (yet), collected and stored data is a very important asset which must be protected. To understand that, you just have to look at…
Learn more