Posts tagged with "cryptography"



BlackBerry UEM version 12.19: Everything You Need to Know
Blog | Endpoint Protection · 31. October 2023
BlackBerry Unified Endpoint Management (UEM) is a comprehensive mobile device management solution. It enables organizations to securely manage and control mobile devices, applications, and content. UEM offers a single platform for managing a variety of endpoints, including smartphones, tablets, laptops, and other mobile devices, to enhance security and productivity.

Demystifying Cybersecurity: Goodbye Passwords, Hello Passkeys?
Blog | Endpoint Protection · 10. July 2023
Passwords have been used for decades to protect all types of information, but there are many challenges associated with them. Password fatigue, the feeling from employees of being frustrated by the numerous passwords one needs to remember for different accounts, poses a challenge for enterprises as it can lead to users resorting to weak or reused passwords, compromising security, and increasing the risk of unauthorized access and potential data breaches. Securely managing many user passwords...

Solution Highlight: Quantum Xchange’s Phio Trusted Xchange (TX)
Blog | Endpoint Protection · 16. May 2023
With the exponential rise of quantum computing in recent years, current encryption algorithms used to secure our data and communications networks are at risk of becoming obsolete. Using the Shor algorithm, the power of a quantum computer will be able to break modern encryption standards sparking the largest cryptographic migration in the history of computing – requiring organizations to replace legacy encryption with quantum-safe cryptography.

Quantum Computing | Time to Get Post-Quantum Ready
Blog | Endpoint Protection · 04. April 2023
In our last blog, we talked about the current challenges with cryptography that urgently need to be addressed, considering the exponential rise of quantum computing and the risk posed to the security of our communications. Today, we will review the existing technological approaches from the industry to solve these challenges and ensure our communications will remain secure for years to come from both traditional and quantum computer cyberattacks.

Quantum Computing | Time to Get Post-Quantum Ready
Blog | Endpoint Protection · 21. March 2023
As we discussed in a recent blog post, quantum computing, like any major technological advance, will bring a lot of good things, but it also poses a serious risk to the security of our communications, making them vulnerable to new quantum-powered attacks performed by state-sponsored cybercriminals. While most technologies used to secure our data were believed to be secure and “unbreakable” some years ago, they will certainly not be in the years to come. Quantum computing is accelerating...