wpadmin

wpadmin

Why Key Shadowing Will Disrupt the Cryptographic Key Market

Why Key Shadowing Will Disrupt the Cryptographic Key Market Two months ago, our firm announced a partnership with HyperSpace Security to bring their encryption technology, Key Shadowing, to market. You can read the press release here, press release. The headline claims Key Shadowing to be a “disruptive’ technology to the cryptographic key market. A rather …

Why Key Shadowing Will Disrupt the Cryptographic Key Market Read More »

Disruptive Key Shadowing Technology Eliminates Master Key Storage, Says HyperSpace Security and Intelligence Services Group

Disruptive Key Shadowing Technology Eliminates Master Key Storage, Says HyperSpace Security and Intelligence Services Group ISG ANNOUNCES TODAY MAJOR PARTNERSHIP WITH HYPERSPACE SECURITY The announcement today of our partnership with HyperSpace Security for their patented Key Shadowing technology puts us in a position to deliver a ground breaking and disruptive cryptographic key solution to the …

Disruptive Key Shadowing Technology Eliminates Master Key Storage, Says HyperSpace Security and Intelligence Services Group Read More »

Is Your IT Department Prepared to Fight Cybercrime

Is Your IT Department Prepared to Fight Cybercrime I was reading an interesting article titled: Is 2018 the year cybercrime becomes mainstream and was wondering how prepared are IT/Security staffs to handle and investigate a cypercrime against their company. What expertise and training do they have to conduct investigations, comply with chain of evidence, adhere to an …

Is Your IT Department Prepared to Fight Cybercrime Read More »

Are People the Achilles Heel in Security? Maybe When it Comes To DNA Testing

Mobile Communications Risk, Are You Prepared? ENTERPRISE MOBILE ENCRYPTION IS REQUIRED, BUT FEW COMPANIES HAVE IT The mobile wave is here. You can not avoid it. Everywhere I go business is being conducted on mobile devices. Last year at LegalTech in NYC everywhere you looked people were texting, talking, emailing, sharing documents and conducting business …

Are People the Achilles Heel in Security? Maybe When it Comes To DNA Testing Read More »