The Blog

The latest from our encryption experts here at Echoworx

Subscribe to our Content

April 13, 2016

Unlocking Encryption Key Management

Any encrypted communication is only as secure as the keys used by the system that locked them. If the keys are compromised by hackers, negligence or...

Read Full Post
April 07, 2016

The Apple Hack: A Problem Engineered to Protect Us

The FBI got around ordering Apple to cooperate in breaking its own security, but when the next case arises, and it will, should the company refuse to...

Read Full Post
February 08, 2016

Security and the Path of Least Resistance

Physics says that the path of least resistance is generally the one that most people take. If we contextualise this by looking at how humans have...

Read Full Post
January 13, 2016

Looking for a Secure Email Solution?

Here are five of the most important factors to consider when looking for a secure email solution:

Read Full Post
December 04, 2015

Cryptography from the Afterglow of the Big Bang

Physicists have proposed the use of cosmic microwave background, or CMB, radiation power spectrum as a random bit generator for symmetric and...

Read Full Post
1 ...
7 8 9 10 11