In just a few short years, Bitcoin, the innovative cryptocurrency underpinned by Blockchain technology, has earned broad legitimacy and won…
In order to talk about any specialized field of knowledge, you need a common language with agreed upon terms, definitions…
The Internet of Things (IoT) is changing manufacturing for the better. With data from billions of connected devices and trillions…
It’s not breaking news that we need to stop using SHA-1. Public trust CAs stopped using SHA-1 to sign certificates…
FREE WEBINAR NOVEMBER 9 With national and global security-related events on the rise, now is the time for increased awareness…
Inspired by National Cybersecurity Awareness Month (NCSAM), Thales, a Technology Alliance Partner, kicked off a partner spotlight series. In this…
Return of Coppersmith’s Attack (ROCA) is a vulnerability in the generation of RSA keys used by a software library adopted in cryptographic…
Establishing safety and security in automotive design goes far beyond crash test dummies. By 2022, the global automotive Internet of…
Public Key Pinning was great idea at first. Google used static public keys to protect their websites. In doing so,…
In developed economies, more than 70% of people over the age of 18 carry at least one financial card. In…