Our Blog
Home / Blog
Cybercrime: The Dangerous World of QR Codes
QR codes are everywhere these days. People use them to open websites, download apps, collect loyalty points, make payments and transfer money. This is very convenient for people, but of course there is a catch: Cybercriminals also try to cash in and have already...
An Analysis of Dangerous Curves
Some recently exposed vulnerabilities in cryptographic software highlight an old problem. Software often fails when in "exotic and rarely used configurations.” The recently-published CVE-2022-0778 vulnerability, and the related CVE-2020-0601 vulnerability, both...
The Importance of Automation in Data Classification
It’s no surprise to anyone that the amount of data that exists is rapidly growing. A report by IDC predicts that by 2025, the global datasphere will have grown to 175 zettabyes. To put in perspective how much data this truly is, one zettabyte is equal to one trillion...
Data Security Best Practices for Electrical and Electronics Manufacturing
Data processing has become an integral part of every business, regardless of the industry in which they operate. While the electrical and electronics manufacturing sector does not collect consumer data on a large scale, it generates and acquires other types of highly...
A True Converged Platform Starts with a Powerful Network Firewall
By John Maddison | May 04, 2022 Building and managing networks is hard. It requires specialized skills and training, especially today, when networks must be designed to automatically adapt to the constant pressures of digital acceleration. Ironically, this is one of...