What cybersecurity in a post-quantum world?
Highlights
Encryption ABC's
5 preconceived ideas about encryption!
Too many preconceived ideas about encryption stop companies from taking action. Such reticence can be costly when sensitive data is leaked and disclosed. A look at five stubborn misconceptions...
Learn moreTech culture
What cybersecurity in a post-quantum world?
With the new computational capabilities provided by quantum technology, cryptography will enter a new dimension. But this power can also fall into the hands of cybercriminals or rogue states. So…
Learn moreTech culture
AI and cybersecurity: marketing pitch or true progress?
For now, artificial intelligence's contribution to cybersecurity solutions is limited to the detection of advanced threats. AI isn’t able to automate incident response yet. The reliability of algorithmic models is…
Learn moreTech culture
DPOs and CISOs what are the synergies?
Two key professions in the administration of organizations have emerged in recent years: the Chief Information Security Officer (CISO) - due to the growing pressure from cyber-attacks - and the…
Learn moreTech culture
Symmetric and asymmetric: why two types of encryption?
Encryption is one of the solutions to protect yourself and guarantee confidentiality. There are actually two main families: asymmetric encryption (e.g.: RSA, ECDSA) and symmetric encryption (e.g: AES-256). Each has…
Learn moreTech culture
How to secure a thumb drive or an external hard drive?
Knowing that USB devices (thumb drive, external hard drive) as well as memory cards (SD cards) are easy to duplicate, steal or lose. It’s imperative to define a strategy to…
Learn moreTech culture
Data: a valuable asset to protect using encryption
Although it doesn’t feature on balance sheets (yet), collected and stored data is a very important asset which must be protected. To understand that, you just have to look at…
Learn more