Article posted: Mar 01

By Marcus Hartwig, GM Americas

For more than 20 years, cryptographic hash functions like SHA-1 have played a major role in browser security, managing code repositories or even just detecting duplicate files in storage. SHA-1, or Secure Hash Algorithm 1, was designed by the United States National Security Agency and was published by the United States NIST. We applaud the recent collaboration of the CWI Institute in Amsterdam and Google, which now shows its many flaws and security weaknesses.

Continue Reading...

Article posted: Dec 04

By Joakim Thorén, CEO

Information is Beautiful identified the biggest data security breaches since AOL's massive security blunder which compromised 92 million records in 2005. Interestingly, it seems there were at least a dozen breaches each year where hundreds of millions of records were compromised in retail, financial services, government, medical organizations and other industries. As in the AOL case, some of the most severe security leaks were attributed to lost or stolen equipment or insider threats.

Continue Reading...

Article posted: Nov 01

By Joakim Thorén, CEO

Your home provides shelter for your family and likely houses important documents, maybe some cash and jewelry, and perhaps the rare stamp collection you inherited from your Uncle Stanley. You want all of these things to be protected, so you visit a locksmith and purchase the best lock money can buy for your front door. You like the lock so much you put one on the back door, too.

Continue Reading...