BLOG PRIM’X
Encryption and data confidentiality
Highlights
Encryption ABC's
5 preconceived ideas about encryption!
Too many preconceived ideas about encryption stop companies from taking action. Such reticence can be costly when sensitive data is leaked and disclosed. A look at five stubborn misconceptions...
Learn moreTech culture
Symmetric and asymmetric: why two types of encryption?
Encryption is one of the solutions to protect yourself and guarantee confidentiality. There are actually two main families: asymmetric encryption (e.g.: RSA, ECDSA) and symmetric encryption (e.g: AES-256). Each has…
Learn moreEncryption ABC's
Make life difficult for hackers: encrypt your email!
Companies and public administrations have never feared being the target of cyber attacks more than they do now. Theft or data corruption, data locked by ransomware, such threats can jeopardize…
Learn moreTech culture
How to secure a thumb drive or an external hard drive?
Knowing that USB devices (thumb drive, external hard drive) as well as memory cards (SD cards) are easy to duplicate, steal or lose. It’s imperative to define a strategy to…
Learn moreTech culture
Data: a valuable asset to protect using encryption
Although it doesn’t feature on balance sheets (yet), collected and stored data is a very important asset which must be protected. To understand that, you just have to look at…
Learn moreIdeas & initiatives
Traveling abroad: keep control of your data
Working from home has increased the IT risk factor, but that has always been true when traveling, especially abroad. At trade shows, on customer sites, in Europe or further afield,…
Learn more