Our Blog
Home / Blog
An Analysis of Dangerous Curves
Some recently exposed vulnerabilities in cryptographic software highlight an old problem. Software often fails when in "exotic and rarely used configurations.” The recently-published CVE-2022-0778 vulnerability, and the related CVE-2020-0601 vulnerability, both...
The Importance of Automation in Data Classification
It’s no surprise to anyone that the amount of data that exists is rapidly growing. A report by IDC predicts that by 2025, the global datasphere will have grown to 175 zettabyes. To put in perspective how much data this truly is, one zettabyte is equal to one trillion...
Data Security Best Practices for Electrical and Electronics Manufacturing
Data processing has become an integral part of every business, regardless of the industry in which they operate. While the electrical and electronics manufacturing sector does not collect consumer data on a large scale, it generates and acquires other types of highly...
A True Converged Platform Starts with a Powerful Network Firewall
By John Maddison | May 04, 2022 Building and managing networks is hard. It requires specialized skills and training, especially today, when networks must be designed to automatically adapt to the constant pressures of digital acceleration. Ironically, this is one of...
Stalkerware — the threat is still there
Anastasia StarikovaApril 12, 2022 What is stalkerware, how widespread is the problem, and what is the relationship between domestic and digital abuse. Have you ever seen a movie or TV-show where the stalker finds out everything about their victim by means of a spying...