Affordable, manageable, understandable solution for cyber security. Get early access for Product X !
Whatsapp Privacy Issue and Comparison with Telegram and Signal
Whatsapp Privacy Issue and Comparison with Telegram and Signal

  Whatsapp recently updated its privacy policy. It was about sharing collected information with Facebook. If you are living in Europe, this situation is not valid for you. General Data Protection Regulation (GDPR) will protect your personal data. But if you are living outside of Europe, Whatsapp made it compulsory to agree to the terms. Most people believed that Facebook would be able to read our message content, but it was not the case. They just wanted to share the data listed below for improving their targeted advertising model. Since 2016 they have been sharing this content. Due to regularizations…

Read More
Lightweight Cryptology Standardization
Lightweight Cryptology Standardization

  Standard cryptology methods are well designed for desktop or server environments, so they are applicable for old systems. But today's technology evolves on small devices that connect with each other, like in the internet of things, the network of sensors, or similar areas. There are some constraints about storage, cost, surface area, electric usage, and many more with these small devices. This has led to the need for lightweight cryptology methods today. Unfortunately, there is no standardization by NIST in lightweight cryptology. NIST realized this problem and made a call for a lightweight algorithm and standardization process. First of…

Read More
7 Major Cyber Security Incidents Targeting the Healthcare Industry
7 Major Cyber Security Incidents Targeting the Healthcare Industry

Nowadays, the target of cyber attackers is money and information from as many people as possible. Therefore, the areas where the most personal information is collected become the target. Each person's data is unique to him, and people cannot easily change some of this information, such as credit card, phone number, and identity information. This article will list and tell you the most significant cyberattacks in the health sector. Good reading.   1.Anthem Medical Data Breach A company that makes health insurances called Anthem BlueCross BlueShield was exposed to a massive cyberattack in…

Read More
Zero Trust Architecture
Zero Trust Architecture

Zero Trust is a security model introduced in 2010 by John Kindervag, a former Forrester analyst. Since then, Zero Trust has become one of the most common patterns in cybersecurity. In the last few years, the significant data breaches show that all companies, from small to largest, need to be more active in security. The Zero Trust Model is the right fit for this business. This article will discuss what Zero Trust architecture is, why it is so important, its principles, and principles. Good reading. What is Zero Trust? Zero Trust is a security model that requires strict authentication of…

Read More