Echoworx Blog

A Welcome Reset for Citizen Privacy

A Welcome Reset for Citizen Privacy

Canada’s Public Consultation on National Security The notion that we are being watched digitally has, seemingly overnight, become something many people now accept as a fact of life in the modern,…

Read More

Quantum Computers, End of Cybersecurity?

Quantum Computers, End of Cybersecurity?

Quantum computers have been making news over the last few years, particularly around how they can break encryption, but how serious is the threat and what is going to happen…

Read More

A Single Vulnerability is all a Cyber Criminal Needs

A Single Vulnerability is all a Cyber Criminal Needs

Millions of online transactions are done every day; billions of emails are sent every year. With the massive use of the internet, there is a significant amount of breach risk too.…

Read More

Ahead of the Market, Ahead of the Competition

Ahead of the Market, Ahead of the Competition

Echoworx has achieved its third consecutive year of more than 30 per cent growth, outperforming market predictions. “As a privately owned innovator at the forefront of the encryption industry we’re proud that Echoworx continues…

Read More

First the IP Bill, Then What?

First the IP Bill, Then What?

What is clear is that across the globe there is fast becoming a divide – governments vs. technology companies. In the face of democratic debate, against all the clamoring voices…

Read More

Unlocking Encryption Key Management

Unlocking Encryption Key Management

Any encrypted communication is only as secure as the keys used by the system that locked them. If the keys are compromised by hackers, negligence or other means, then any…

Read More

The Apple Hack: A Problem Engineered to Protect Us

The Apple Hack: A Problem Engineered to Protect Us

The FBI got around ordering Apple to cooperate in breaking its own security, but when the next case arises, and it will, should the company refuse to help, the outcome…

Read More

Security and the Path of Least Resistance

Security and the Path of Least Resistance

If employees don’t have an experience that meets their needs and requirements, they will almost certainly disregard process and search for another technique to get the job done. Physics says…

Read More

Cryptography from the Afterglow of the Big Bang

Cryptography from the Afterglow of the Big Bang

Physicists have proposed the use of cosmic microwave background, or CMB, radiation power spectrum as a random bit generator for symmetric and asymmetric key cryptography. The CMB is thermal radiation created…

Read More

Stay Updated With the Latest Encryption & Security Trends

Sign up to get our latest articles sent directly to your inbox.

Your email will not be shared with any 3rd party. See our Privacy Policy.