Posts about Encryption

High-profile data breaches are back in the headlines, and it is almost certain that the world has not seen the last of these massive hauls of personal information. But so far, at least, most of these attacks have involved exploiting weakness in local network security systems to swipe information lodged in corporate and cloud-based storage systems, otherwise known as data at rest. Increasingly, however, security experts are starting to examine vulnerabilities of data in motion ...

Read the full post
A blockchain is a peer-to-peer distributed ledger (information recorded in a shared database) that enables open and trusted exchanges over the internet without using central servers or an independent trusted authority. Using consensus, a shared record is distributed to all participants in a network to validate transactions and remove the need for a third-party intermediary ...
Read the full post

Your robot might beat you up. It sounds like a tired sci-fi cliché, but it’s true. Early last month, security firm IOActive released research that documented the sorry state of robotic security. The firm found lots of problems – and did so without looking very hard ...

Read the full post
Across Europe and beyond, businesses are moving their mission-critical data to the Nordics. With cheaper land prices and cold conditions ideal for cooling servers, the cost advantages offered by data centers in Scandinavia and the Baltics are impossible to ignore. Even more significant is the low price of electricity, which makes running a data center near the North Pole incredibly efficient – in many cases, up to 50% cheaper when compared with central Europe ...
Read the full post
In today’s evermore networked society, data protection is a serious business. Security breaches lead to unwanted headlines and a loss of trust in enterprise organizations (such as banks or healthcare providers). Data security and keeping ahead of potential attackers, is a rapidly evolving field of development. Potential areas may involve safeguarding modern cloud computing environments or protecting commercial activities over the web ...
Read the full post