As the security landscape continues to shift our security defenses must evolve too. Traditional and static systems are inherently insecure and become less secure every day; the same is true for cryptography. Developed centuries ago, cryptography is perhaps one of the earliest security defenses. The application of cryptography for government secrets protection has evolved through wars and global innovation. Today, cryptography is used to protect many of the routine activities we take for granted, like bank transactions and online shopping. In business environments, cryptography is used to protect and authenticate applications and IoT devices, however the onset of quantum computing…
Author: Ted Shorter
Managing scaling challenges as more employees and devices log on remotely COVID-19 is forcing us to rapidly shift our daily interactions in every scenario. Adjusting and limiting our personal and professional interactions are testing the limitations of protocols put in place within the businesses and institutions we rely on. Business leaders are evaluating every option available to maintain operations and for many, working from home is the necessary choice. Major employers like Google, Shopify, Twitter and JPMorgan have announced remote working policies, and behind the scenes thousands of small and mid-sized businesses are also issuing guidance and temporary remote working…