encryption

The Evolution of Hashing Algorithms: From MD5 to Modern Day
Hashing algorithms have come a long way! This blog post takes you on a journey through the evolution of hashing, from early examples like MD5 to the modern SHA family and beyond ...
IBM Launches Guardium Data Security Center: Well-Timed for High-Risk Sites
With China showcasing significant recent advancements in quantum computing on top of the concern that a quantum computer could break even the most powerful cryptographic protections in a matter of minutes, having ...

Discord’s New End-to-End Encryption, LinkedIn Using Your Data for AI Training
In episode 348, Tom and Scott discuss Discord’s new end-to-end encryption for audio and video calls, involving the DAVE Protocol, third-party vetting by Trail of Bits, and its impact on users. They ...
Introducing Fine-Grained Data Security for Amazon S3
Amazon S3 (Simple Storage Service) is a cornerstone of the AWS ecosystem, providing a highly scalable, durable, and cost-effective object storage solution. It serves as the foundation for countless AWS services, from ...

The Problem With Third-Party Breaches: A Data Protection Dilemma
Third-party breaches pose a significant challenge to organizations, demanding meticulous attention and measures to prevent data compromises ...

How Secure is the “Password Protection” on Your Files and Drives?
Most password protection methods use some form of encryption, but is there a clear choice between software and hardware encryption when it comes to protecting your personal or business files from theft, ...
Australia Threatens to Force Companies to Break Encryption
In 2018, Australia passed the Assistance and Access Act, which—among other things—gave the government the power to force companies to break their own encryption. The Assistance and Access Act includes key components ...
Understanding Quantum Threats and How to Secure Data with Post-Quantum Cryptography
Post-Quantum Cryptography (PQC) is a new generation of encryption algorithms for protecting data against powerful quantum computers. Quantum computers use quantum mechanics to solve complex problems much faster than traditional computers. With ...

Telegram is NOT an Encrypted Messaging App, Must-See Documentaries
In this episode, we explore the recent arrest of Telegram founder Pavel Durov in France and discuss the app’s encryption claims. Is Telegram truly an encrypted messaging app? Joining the conversation is ...

‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril
Should’ve listened to Edison: After the arrest of Pavel Durov—the Telegram CEO—comes news of domestic extremists using the chat app to organize ...