Security Concepts – The CIA Triad

Security Concepts – The CIA Triad

When it comes to security concepts, there are several measurements that one should keep in mind. The most common and primary goals of a security infrastructure are the goals of the CIA Triad. The CIA Triad is an information security model that is used to create a...
Are Quantum Computers a Threat for your Encryptions?

Are Quantum Computers a Threat for your Encryptions?

Researchers have already developed ways to decrypt encryption algorithms more efficiently than ever by using quantum computers. This raises one urgent question: when will quantum computers be powerful enough to threaten our current cryptographic landscape? What are...
Security Policies – What exactly are they?

Security Policies – What exactly are they?

For most organizations, maintaining security is an integral part of day-to-day business. Many organizations would fail if their security was seriously compromised.  To reduce the likelihood of security failures, the security implementation process has been formalized...
Zero Trust – trust no one?

Zero Trust – trust no one?

It seems like Zero Trust technology is the silver bullet to solve all security challenges in a corporate network. But what exactly is Zero Trust, why should it be used, and how does it protect the assets? First, Zero Trust is not technology at all. John Kindervag...