HomeEncryption

Encryption

Data recovery depends on how good your backup strategy is

99% of surveyed IT decision makers state they have...

The role of streaming machine learning in encrypted traffic analysis

Organizations now create and move more data than at...

SHA 256 Algorithm Explained by a Cyber Security Consultant

The SHA 256 algorithm is the industry-standard hashing algorithm for file and data integrity. But what...

Payment Security: A Perspective from Europe

During the eighteen plus months since the outbreak of the COVID-19 epidemic, many businesses have had...

From fragmented encryption chaos to uniform data protection

Encryption is so critical to an organization's security that...

Be On Alert This Holiday Season

In this blog we look at the challenges around payment data security during the hectic holiday...

Cybersecurity Month: Be Cyber Smart

As anOfficial Championof National Cyber ​​Security Awareness Month (NCSAM), the Council will be sharing educational resources on...

Just Published: P2PE v3.1

Today, the PCI SSC published a minor revision to the PCI Point-to-Point Encryption (P2PE) ® Standard. ...

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!