Data

USB Key Kingston Iron Key VP50: Private Data Vault

USB Key Kingston Iron Key Vp50: Private Data Vault

One of the biggest security holes for data transfers? Insufficiently shielded USB flash drives! The Californian storage giant Kingston now delivers the multi-hardened mini flash memory of the “private armored safe” category with multi-password option and anti-brute force strategy. The Kingston IronKey Vault Privacy 50 (VP50) features hardware-based XTS-AES 256-bit encryption and is FIPS-197 certified. …

USB Key Kingston Iron Key VP50: Private Data Vault Read More »

Analytics Make Supply Chain Security More Robust

Security analytics technology is becoming increasingly important to supply chain management. Analytics technology has become essential to many aspects of enterprise management. Some of the benefits of analytics even overlap with others. More companies than ever are using analytics to improve their security. They are also using data analytics tools to streamline many logistical processes …

Analytics Make Supply Chain Security More Robust Read More »

How to Defend Against Cybercrime Groups with Million-Dollar Budgets?

How to Defend Against Cybercrime Groups with Million-Dollar Budgets?

The question from the headline is probably asked by every IT today. There are simple answers: “not at all”, “de-network / reduce dependency on IT” and “buy new tools”. Unfortunately, the same is true here as with many other complex issues: There is no quick easy solution (“silver bullet”). But there is a proven, three-step …

How to Defend Against Cybercrime Groups with Million-Dollar Budgets? Read More »

AIOps and Machine Learning: The Secret Recipe for Observability

AIOps and Machine Learning: The Secret Recipe for Observability

Traditional monitoring aggregates and displays data. When problems occur, traditional monitoring generates alerts. And there can be a lot of them. Some alerts are essential, but others just distract from important information. Filtering out these unimportant alerts is therefore essential. Time for Observability! Complex IT infrastructures leverage microservice architectures, and it’s critical that tech professionals …

AIOps and Machine Learning: The Secret Recipe for Observability Read More »

What is KMIP (Key Management Interoperability Protocol)?

What is KMIP (Key Management Interoperability Protocol)?

The Key Management Interoperability Protocol is a protocol standardized by OASIS (Organization for the Advancement of Structured Information Standards). KMIP enables the communication of applications and systems for the storage and management of keys, certificates, or other secret objects. What is KMIP (Key Management Interoperability Protocol)? The abbreviation KMIP stands for Key Management Interoperability Protocol …

What is KMIP (Key Management Interoperability Protocol)? Read More »

What Is Network Encryption?

what-is-network-encryption

Network encryption operates on layer 2 or 3 of the OSI layer model. It ensures the confidentiality and integrity of transmitted data as well as the authenticity of communication partners and is transparent to higher-layer protocols or applications. What is network encryption? Network encryption encrypts data directly at the network layer. In the OSI layer …

What Is Network Encryption? Read More »

How Does a Captcha Work?

How Does a Captcha Work?

Many IT security measures are not developed or deployed until you encounter a concrete problem. It was the same with Captcha. This security query was developed to put a stop to spam and the unwanted use of web services by automated bots and to clearly distinguish humans from machines. But as is so often the …

How Does a Captcha Work? Read More »

What Is a Side Channel Attack?

What Is a Side Channel Attack

A side-channel attack does not directly attack algorithms or data. The attack method uses physical or logical side effects and tries to extract protected information or algorithms by observation and analysis. Electromagnetic emissions, energy consumption, the time required for certain functions, memory usage, and others are used. Side-channel attacks are costly and difficult to prevent. …

What Is a Side Channel Attack? Read More »

What is Spoofing?

what is spoofing in computer

The term spoofing covers various methods and technical procedures to disguise one’s own identity or to feign a false identity. Several types of spoofing exist, such as IP, e-mail, DNS, ARP, URL, or caller ID spoofing. Cybercriminals use spoofing to gain unauthorized access to sensitive data, perform unauthorized transactions, introduce malware, or cause other damage. …

What is Spoofing? Read More »

What is TEE(Trusted Execution Environment)?

What is a Trusted Execution Environment (TEE)?

A Trusted Execution Environment creates an isolated environment, sealed off from other applications and data, for the protected execution of applications or the storage of data that requires protection. The environment can be implemented on the main processor, a dedicated processor, or a special chip. Common application areas are smartphones. For example, in some devices, …

What is TEE(Trusted Execution Environment)? Read More »

What Is Biometrics?

What Is Biometrics

Biometrics refers to the science of measuring and analyzing biological characteristics. Today, biometric procedures are used to identify or verify persons. Biometric procedures are, for example, fingerprint or face recognition. What is biometrics? Biometrics goes back to the ancient Greek terms “bios” and “metron” and can be roughly translated as “measurement of human characteristics”. It …

What Is Biometrics? Read More »

Backup with Synology NAS

Backup with Synology NAS

Scheduling and managing backups and regular backups is an important but often time-consuming task. A Synology NAS brings all the features of various apps to make the backup run as smoothly as possible. The new HyperBackup connects all backup processes, from local media to various cloud services. Backups should be part of every user’s daily …

Backup with Synology NAS Read More »

Users Completely Screened

Users Completely Screened

With Oxygen Forensic Detective, Oxygen Forensics delivers software that can be used to extract and analyze data from mobile devices, SIM cards, memory cards, drones, and IoT devices. With the solution, the manufacturer is primarily targeting investigators, intelligence agencies and companies. In the test lab, the forensics tool was able to show what it is …

Users Completely Screened Read More »