Back to homepage

logo_s4d_sm

The Safety4Data Blog


Subscribe to our newsletter to learn more, or request additional information about data encryption and cyber-security.
INVEST IN YOUR SECURITY

High-Risk Corporate Data Cloud Storage

Recently we have published on our blog page an article on the data breach causes. This time let us concentrate...

Frequent Data Breach Causes

Most people picture hacker groups, state-of-art computer technology, and sophisticated cyber attacks behind a data breach. However, we should not...

Data Breach Costs in 2014 and 2015

The latest global data breach analysis, for years 2014 and 2015, shows a continuous, increasing cost to organizations affected by...

Symmetric and Asymmetric Ciphers (Diffie-Hellman Key Exchange)

Symmetric and Asymmetric Ciphers (Diffie-Hellman Key Exchange)

In the previous installment, we defined public encoding algorithms and the reasons behind their use. Today we will define their...

Security through Obscurity vs. Public Algorithms

Security through Obscurity vs. Public Algorithms

Similarly to the historical time periods we have mentioned in previous articles, which did not distinguish between message concealment and...

Encoding Machines, Enigma, Mathematics

Encoding Machines, Enigma, Mathematics

As long as the main “instrument” of cryptography and cryptology was a man, both encoding complexity and decoding speed had...

Cryptography, Cryptology, and Steganography – Term Definition

Cryptography, Cryptology, and Steganography – Term Definition

According to historical records, classified message exchanges date back to several centuries B.C.  Specifically to the Ancient Greek civilization; it...

Encoding: History, Myths, and Facts

Encoding: History, Myths, and Facts

Encoding, encryption, cryptology, cryptography, cipher etc. These might be unfamiliar terms. Within next few blog posts we will do our...

Things we learned last week!

What’s News In Cyber Security! Investing in your security includes taking time to understand security. Here are 5 stories from the...

Do you know what EINSTEIN is?

Einstein (also known as the EINSTEIN Program) is an intrusion detection system that monitors the United States federal government network...