In The News

ZIPcrypt Review: A Revolutionary Encryption Tool

By SoftwareSugges We’re living in a hyper-digital era and never before has cryptography attained such massive importance in our lives. Organizations all over the globe have realized the value of encryption tools to ensure that their data is protected in transit and...

How to Avoid the Top Three Causes of Data Breaches in 2019

What's the price of unprotected IT infrastructure? Cybercrime Magazine says that global damages will surpass $6 billion as soon as 2021. Here we'll go through some of the most frequent and emerging causes of data breaches in 2019 and see how to address them in a...

Google confirms ‘quantum supremacy’ breakthrough

Google has officially announced that it’s achieved quantum supremacy in a new article published in the scientific journal Nature. The announcement comes exactly one month after it initially leaked, when Google’s paper was accidentally published early.Did you enjoy...

NordVPN confirms it was hacked

NordVPN, a virtual private network provider that promises to “protect your privacy online,” has confirmed it was hacked. The admission comes following rumors that the company had been breached.Did you enjoy this article? Then read the full version from the author's...

Newsrooms, let’s talk about G Suite

There are many legitimate reasons to give administrators this far-reaching ability to organize and retain user data, such as compliance with legal requests. All of this logging and retention functionality may also help your organization’s administrators monitor for...

Cloud Breaches Like Capital One Will Strike At Self-Driving Cars

The news has covered yet another breach of systems security that involves the theft of massive amounts of data, in this case impacting an estimated 100 million customers of Capital One Financial Corp. In the past, the public might have reacted vociferously in outright...

Hack Breaks PDF Encryption, Opens Content to Attackers

Researchers in Germany have invented a new hack that can allow someone to break the encryption of PDF files and access their content  — or even forge signed PDF files under certain circumstances. Did you enjoy this article? Then read the full version from the author's...

‘Harvesting Attacks’ & the Quantum Revolution

Stockpiles of stolen information sitting in foreign databases are ready to be exposed the minute there's a working quantum computer in five to ten years. The time to act is now. The Information Age replaced industrial equipment with data. Did you enjoy this article?...

Secure Channels Named Finalist in Black Unicorn Awards for 2019

Secure Channels is Now one of the Top 30 Finalists in Most Prestigious Awards for Cybersecurity Companies Who Have the Potential of Being Valued at $1B IRVINE, CA, UNITED STATES, July 22, 2019 /EINPresswire.com/ SECURE CHANNELS, the cybersecurity industry’s leading...

It Only Took 9 Seconds to Guess a DOD Weapons System Password

The first step in solving any problem is admitting there is one. But a new report from the US Government Accountability Office finds that the Department of Defense remains in denial about cybersecurity threats to its weapons systems. Did you enjoy this article? Then...

Data Encryption Strategy: Intersection of Encryption and Usability

Big Data is powering digital transformation initiatives around the world. But innovating through data also creates a long list of cybersecurity and privacy challenges. Here's an idea of how that looks: Did you enjoy this article? Then read the full version from the...