
Ahead of the Market, Ahead of the Competition
Echoworx has achieved its third consecutive year of more than 30 per cent growth, outperforming market predictions. “As a privately owned innovator at the forefront of the encryption industry we’re proud that Echoworx continues…

What is clear is that across the globe there is fast becoming a divide – governments vs. technology companies. In the face of democratic debate, against all the clamoring voices…

Unlocking Encryption Key Management
Any encrypted communication is only as secure as the keys used by the system that locked them. If the keys are compromised by hackers, negligence or other means, then any…

The Apple Hack: A Problem Engineered to Protect Us
The FBI got around ordering Apple to cooperate in breaking its own security, but when the next case arises, and it will, should the company refuse to help, the outcome…

Security and the Path of Least Resistance
If employees don’t have an experience that meets their needs and requirements, they will almost certainly disregard process and search for another technique to get the job done. Physics says…

Cryptography from the Afterglow of the Big Bang
Physicists have proposed the use of cosmic microwave background, or CMB, radiation power spectrum as a random bit generator for symmetric and asymmetric key cryptography. The CMB is thermal radiation created…

Reliance on Data Residency Is Not Enough
Organizations eager to meet privacy and regulatory requirements place far too much emphasis on data residency alone. While it does matter where data is stored, geographic location is not fixed when…