The Evolution of Hashing Algorithms: From MD5 to Modern Day

The Evolution of Hashing Algorithms: From MD5 to Modern Day

Hashing algorithms have come a long way! This blog post takes you on a journey through the evolution of hashing, from early examples like MD5 to the modern SHA family and beyond ...

IBM Launches Guardium Data Security Center: Well-Timed for High-Risk Sites

With China showcasing significant recent advancements in quantum computing on top of the concern that a quantum computer could break even the most powerful cryptographic protections in a matter of minutes, having ...
Discord's End-to-End Encryption: What You Need to Know!

Discord’s New End-to-End Encryption, LinkedIn Using Your Data for AI Training

In episode 348, Tom and Scott discuss Discord’s new end-to-end encryption for audio and video calls, involving the DAVE Protocol, third-party vetting by Trail of Bits, and its impact on users. They ...

Introducing Fine-Grained Data Security for Amazon S3

| | Cloud, data masking, encryption, Privacy
Amazon S3 (Simple Storage Service) is a cornerstone of the AWS ecosystem, providing a highly scalable, durable, and cost-effective object storage solution. It serves as the foundation for countless AWS services, from ...
third-party, breaches, vendor, automation, SEC business, risk, cyber, CRQ, TPRM risk management register

The Problem With Third-Party Breaches: A Data Protection Dilemma  

Third-party breaches pose a significant challenge to organizations, demanding meticulous attention and measures to prevent data compromises ...
Security Boulevard
password, protection

How Secure is the “Password Protection” on Your Files and Drives?

| | encryption, Password, protection
Most password protection methods use some form of encryption, but is there a clear choice between software and hardware encryption when it comes to protecting your personal or business files from theft, ...
Security Boulevard

Australia Threatens to Force Companies to Break Encryption

In 2018, Australia passed the Assistance and Access Act, which—among other things—gave the government the power to force companies to break their own encryption. The Assistance and Access Act includes key components ...

Understanding Quantum Threats and How to Secure Data with Post-Quantum Cryptography

Post-Quantum Cryptography (PQC) is a new generation of encryption algorithms for protecting data against powerful quantum computers. Quantum computers use quantum mechanics to solve complex problems much faster than traditional computers. With ...
Telegram's Encryption Controversy Explained | Must Watch!

Telegram is NOT an Encrypted Messaging App, Must-See Documentaries

In this episode, we explore the recent arrest of Telegram founder Pavel Durov in France and discuss the app’s encryption claims. Is Telegram truly an encrypted messaging app? Joining the conversation is ...