What cybersecurity in a post-quantum world?

Highlights

Encryption ABC's

5 preconceived ideas about encryption!

Too many preconceived ideas about encryption stop companies from taking action. Such reticence can be costly when sensitive data is leaked and disclosed. A look at five stubborn misconceptions...

Learn more

Tech culture

What cybersecurity in a post-quantum world?

With the new computational capabilities provided by quantum technology, cryptography will enter a new dimension. But this power can also fall into the hands of cybercriminals or rogue states. So…

Learn more

Tech culture

AI and cybersecurity: marketing pitch or true progress?

For now, artificial intelligence's contribution to cybersecurity solutions is limited to the detection of advanced threats. AI isn’t able to automate incident response yet. The reliability of algorithmic models is…

Learn more

Tech culture

DPOs and CISOs what are the synergies?

Two key professions in the administration of organizations have emerged in recent years: the Chief Information Security Officer (CISO) - due to the growing pressure from cyber-attacks - and the…

Learn more

Tech culture

Symmetric and asymmetric: why two types of encryption?

Encryption is one of the solutions to protect yourself and guarantee confidentiality. There are actually two main families: asymmetric encryption (e.g.: RSA, ECDSA) and symmetric encryption (e.g: AES-256). Each has…

Learn more

Tech culture

How to secure a thumb drive or an external hard drive?

Knowing that USB devices (thumb drive, external hard drive) as well as memory cards (SD cards) are easy to duplicate, steal or lose. It’s imperative to define a strategy to…

Learn more

Tech culture

Data: a valuable asset to protect using encryption

Although it doesn’t feature on balance sheets (yet), collected and stored data is a very important asset which must be protected. To understand that, you just have to look at…

Learn more