Encryption-as-a-Service Portal For All Your Sensitive Data

In The News

Self-driving cars could soon navigate the world via micropayments
With autonomous vehicles already debuting on our roads and in our airspace, you’ve probably...
Capitol
Union: Hackers have personnel data on every federal employee
Hackers stole personnel data and Social Security numbers for every federal employee, a...
SUBROSA
Mobile Biometrics to Disrupt the Global Payments Market Securing 65% of all MCommerce Transactions by 2020
SUBROSA MIT™ SUBROSA – Mobile Identity Trueness™ (MIT™) – Android App is a simple Android...

191 Million US Voter Registration Records Leaked In Mystery Database

A whitehat hacker has uncovered a database sitting on the Web containing various pieces of...
Industrial control systems

CEO Richard Blech Comments On Control System Breaches

One-Third of Industrial Control Systems Breached in Last Twelve Months Industrial control...

Intel Announces First Quantum Computing Testing Tool

Intel and partners Bluefors and Afore have created a cryoprober, named the Cryogenic Wafer...

SCIFCOM and your Business

The Secure Channels SCIFCOM portal is your gateway to innovative, effective security solutions designed to complement existing investments in security. Secure Channels products offer advanced data protection, adaptable encryption, authentication, and enterprise confidentiality solutions.

  • The process utilizes a worldwide satellite network infrastructure for true double-blinded Token Exchange (encryption key distribution).
  • Uses Oauth, HTTPS, and TLS to secure communications between clients and servers during the Token Exchange process.
  • SCIFCOM does not use the current (PKI) key exchange process which has been widely criticized for being burdensome to implement and vulnerable to attack at the highest levels (CA authority hacks). Additionally, it has already been predicted by experts that advances in quantum computing will render (PKI) insecure.

Technology in the News

Is Your Encryption Flexible Enough? – Cyber Defense Magazine

The science of modern cryptography utilizes mathematics as the basis for transforming information into an encoded secret that cannot be decoded or translated without the correct key. Did you enjoy this article? Then read the full version from the author's...

Secure Channels Launches Desktop Encryption Utility ZIPcrypt™ Featuring XOTIC

Secure Channels Launches Desktop Encryption Utility ZIPcrypt™ featuring XOTIC™ extreme encryption technology and all-new “dialable” cipher-strength UNITED STATES, April 18, 2019 /EINPresswire.com/ -- IRVINE, CALIF. (April 17, 2019) – Secure Channels Inc. Did you enjoy...

HTTPS Isn’t Always as Secure as It Seems

Widespread adoption of the web encryption scheme HTTPS has added a lot of green padlocks—and corresponding data protection—to the web. Did you enjoy this article? Then read the full version from the author's...

540 Million Facebook User Records Found On Unprotected Amazon Servers

It's been a bad week for Facebook users. More than half a billion records of millions of Facebook users have been found exposed on unprotected Amazon cloud servers. Did you enjoy this article? Then read the full version from the author's...

Toyota Reveals a Second Data Breach

Watch for updates on this developing story. Toyota Motor Corp. has reported its second data breach in the past five weeks. The latest incident, revealed Friday, may have exposed data on as many as 3.1 million customers. Did you enjoy this article? Then read the full...

UCLA will pay $7.5 million in claims, cyber enhancements to settle 2015 breach

'); })(); //--> Skip to main content By Topics: Compliance & Legal, Network Infrastructure, Privacy & Security Did you enjoy this article? Then read the full version from the author's...

Quantum computing will break your encryption in a few years

Quantum computers – those that use the principles of quantum entanglement and superposition to represent information, instead of electrical bits – are capable of performing certain types of calculation orders of magnitude more quickly than classical, electronic...

Nielsen warns US ‘not prepared’ for foreign cyberattacks

Homeland Security Secretary Kirstjen Nielsen on Monday called for the U.S. to take on a “whole of society” approach to combat cyber threats, saying the U.S. “is not prepared” to handle hackers backed by other countries. “It’s not just U.S. Did you enjoy this article?...

These Are the Worst Corporate Hacks of All Time

As business processes and personal information move online, the number of data hacks is growing. Some are minor and go undetected, while others are so major that they can put an entire company at risk. Hacks ranged from a few million records exposed to several...

North Korea Is Still Trying to Hack US Critical Infrastructure

The ongoing cyber campaign seeks to infiltrate defense, financial, energy, telecom, and healthcare firms. Did you enjoy this article? Then read the full version from the author's...

SCI Solutions Using SCIFCOM Technology

SCI Subsidiaries Using SCIFCOM Technology

What is SCIFCOM?

The Secure Channels SCIFCOM portal is your gateway to innovative, effective security solutions designed to complement existing investments in security. Secure Channels products offer advanced data protection, adaptable encryption, authentication, and enterprise confidentiality solutions.

  • The process utilizes a worldwide satellite network infrastructure for true double-blinded Token Exchange (encryption key distribution).
  • Uses Oauth, HTTPS, and TLS to secure communications between clients and servers during they Token Exchange process.
  • SCIFCOM does not use the current (PKI) key exchange process which has been widely criticized for being burdensome to implement and vulnerable to attack at the highest levels (CA authority hacks). Additionally, it has already been predicted by experts that advances in quantum computing will render (PKI) insecure.