top of page
Search


The community lacks resources to remediate even the most critical vulnerabilities; they will stay
Ease of use and no formal support (open source) make #Log4j a perfect ingredient for the expansive security risk recipe. If a...

Alexey
Feb 1, 20221 min read
Â
Â
Â


Snapshot of the industry thinking about the Quantum Computing
Episode 6 of the Quantum Technology Explained series We recently surveyed members of the industry on the topic of quantum computing....

Alexey
Jun 25, 20212 min read
Â
Â
Â


Quantum Computing and CISO
Episode 5 - Quantum Technology Explained series Quantum computing is no longer science fiction. It is real and imminent. And it’s a...

Alexey
May 18, 20213 min read
Â
Â
Â


Can Quantum Computing protect data from theft?
Quantum Computing is a new technology that brings disruptive advancements into many areas. It also enables a new way of protecting data....

Alexey
Apr 26, 20211 min read
Â
Â
Â


Eric Schmidt about Quantum Computing implications on security
Episode 4 - Quantum Technology Explained series "You have time now, you do not have time in the future" - Eric Schmidt, former Google CEO...

Alexey
Apr 19, 20212 min read
Â
Â
Â


Quantum computing and the Chief Risk Officer
Episode 3 - Quantum Technology Explained series Link to Episode 2 Quantum computing is a new technology in the computer world. It is the...

Alexey
Apr 6, 20212 min read
Â
Â
Â


The Magic of the Second Quantum Revolution
Episode 2 - Quantum Technology Explained series Link to Episode 1 The starting point in this episode is something scientists occasionally...

Alexey
Feb 12, 20212 min read
Â
Â
Â


When will quantum computing affect you? Security perspective
Episode 1 - Quantum Technology Explained series Quantum is a trendy buzz word floating around the tech community. But what is Quantum...

Alexey
Jan 27, 20212 min read
Â
Â
Â


Beating the code breakers: How Quantum computing changes everything
Beating the code breakers: How Quantum computing changes everything Quantum computing still years away? Perhaps, but companies need to...

Alexey
Dec 9, 20201 min read
Â
Â
Â


Quantum technology influence on cryptography
Quantum computing is developing rapidly and promises to revolutionise technology. By leveraging the foundations of quantum theory, it...

Alexey
Aug 21, 20201 min read
Â
Â
Â


I have nothing to hide, have not I? Privacy breach implications
I am sure that many of you heard, or maybe thought about themselves, that privacy is a good thing, but that is not about me. I have...

Alexey
Jul 23, 20203 min read
Â
Â
Â


When small "s" changes everything: HTTP vs HTTPS
HTTP stands for Hyper Text Transfer Protocol. And what is "s"? It stands for Secure. The HTTP protocol is used to send the website...

Alexey
Jun 26, 20201 min read
Â
Â
Â


Confuse or not confuse: Identification, Authentication and Authorization
These three similar-looking words are always confused. And that has reasonable roots because they all are related to providing access to...

Alexey
Jun 22, 20202 min read
Â
Â
Â


Is there any crypto algorithm, that is unbreakable even in theory? Even for a brute force attack?
Most commonly used cryptography algorithms are robust. They are based on a complex mathematical problem (asymmetric algorithms) or on...

Alexey
Jun 15, 20202 min read
Â
Â
Â


Steganography: Unsolicited yellow dots on your printout
Steganography is the science of hiding things in plain sight, for example, inside images, audio files or papers. Taking as an example one...

Alexey
Jun 12, 20201 min read
Â
Â
Â


What is federated access? Is it right, or harmful, or dangerous?
To get access somewhere, usually, you must provide that service with your name and password. In ancient times people were supposed to...

Alexey
Jun 10, 20202 min read
Â
Â
Â


Information value importance in data protection
Data has inherent value. High for one individual and priceless for another. People protect information and in its digital representation,...

Alexey
Jun 5, 20201 min read
Â
Â
Â


Why do we call software errors as "bugs"?
"Bugs" are errors, flaws, issues or faults in software or hardware. If a bug is not fixed, alone or together with other bugs, it can grow...

Alexey
Jun 3, 20202 min read
Â
Â
Â


What for someone cracks software and let you download it?
I am sure you saw or at least heard when your friend downloaded Photoshop, AutoCAD, Windows or other pirate software from torrent and...

Alexey
Jun 1, 20202 min read
Â
Â
Â


What differs an excellent biometric system from a defective one?
Biometric system is a system that identifies or authenticates you based on "who you are". Fingerprint, Retina scan, Face scan and so on....

Alexey
May 29, 20202 min read
Â
Â
Â
bottom of page
