Echoworx Blog

A Single Vulnerability is all a Cyber Criminal Needs

A Single Vulnerability is all a Cyber Criminal Needs

Millions of online transactions are done every day; billions of emails are sent every year. With the massive use of the internet, there is a significant amount of breach risk too.…

Read More

Ahead of the Market, Ahead of the Competition

Ahead of the Market, Ahead of the Competition

Echoworx has achieved its third consecutive year of more than 30 per cent growth, outperforming market predictions. “As a privately owned innovator at the forefront of the encryption industry we’re proud that Echoworx continues…

Read More

First the IP Bill, Then What?

First the IP Bill, Then What?

What is clear is that across the globe there is fast becoming a divide – governments vs. technology companies. In the face of democratic debate, against all the clamoring voices…

Read More

Unlocking Encryption Key Management

Unlocking Encryption Key Management

Any encrypted communication is only as secure as the keys used by the system that locked them. If the keys are compromised by hackers, negligence or other means, then any…

Read More

The Apple Hack: A Problem Engineered to Protect Us

The Apple Hack: A Problem Engineered to Protect Us

The FBI got around ordering Apple to cooperate in breaking its own security, but when the next case arises, and it will, should the company refuse to help, the outcome…

Read More

Security and the Path of Least Resistance

Security and the Path of Least Resistance

If employees don’t have an experience that meets their needs and requirements, they will almost certainly disregard process and search for another technique to get the job done. Physics says…

Read More

Cryptography from the Afterglow of the Big Bang

Cryptography from the Afterglow of the Big Bang

Physicists have proposed the use of cosmic microwave background, or CMB, radiation power spectrum as a random bit generator for symmetric and asymmetric key cryptography. The CMB is thermal radiation created…

Read More

Reliance on Data Residency Is Not Enough

Reliance on Data Residency Is Not Enough

Organizations eager to meet privacy and regulatory requirements place far too much emphasis on data residency alone. While it does matter where data is stored, geographic location is not fixed when…

Read More

Stay Updated With the Latest Encryption & Security Trends

Sign up to get our latest articles sent directly to your inbox.

Your email will not be shared with any 3rd party. See our Privacy Policy.