Encryption and Data Security Blog
Is Tokenization Right for your Data?
10 years ago, data-at-rest encryption was adequate for many data security needs. File encryption
How secure is Zoom? Decide for yourself.
How Secure is Zoom? Resources you need to decide
What is a digital fingerprint? Part 2
This is part 2 of the FAQ "What is a Digital Fingerprint?" If you
HN – The first chosen-prefix collision for SHA-1
Secrets From the Future, by MC Frontalot, as mentioned by @WorldMaker. You can’t
How does database encryption work?
Transparent Database Encryption Databases like Oracle, Microsoft SQL Server, Postgres, along with modern document-level
What is a digital fingerprint? Part 1
Introduction Reading in the news about "digital fingerprints," and you come across several concepts: