What’s in a Hash?

  • December 19, 2017
  • Function, Hash
  • Hash

A hash function is any function that can be used to map data of random size.

Read More


Managing Risk and Security at the Speed of Digital Business

  • April 21, 2017
  • Business, Digital, Risk, Security
  • Security

Digital business challenges the basic principles of information risk and security management

Read More


Gartner’s Top 10 Strategic Technology Trends for 2017

  • March 29, 2017
  • Artificial intelligence, Gartner, Technology Trends
  • Trends IT&C

Artificial intelligence, machine learning, and smart things promise an intelligent future.

Read More


Google Achieves First-Ever Successful SHA-1 Collision Attack

  • March 29, 2017
  • Collision Attack, Google, Securitate, SHA-1
  • Security

SHA-1, Secure Hash Algorithm 1 is officially dead after a team of researchers from Google and the CWI Institute in Amsterdam announced today submitted the first ever successful SHA-1 collision attack.

Read More


SSL vs. TLS - What's the Difference?

  • March 29, 2017
  • Internet, Security, SSL, TLS
  • Security

The differences between this protocol and SSL 3.0 are not dramatic, but they are significant enough that TLS 1.0 and SSL 3.0 do not interoperate.”

Read More