Most Recent Articles

Key Management: Healthcare's Secret Ingredient for Better Encryption Key Management: Healthcare's Secret Ingredient for Better Encryption Key Management: Healthcare's Secret Ingredient for Better Encryption Key Management: Healthcare's Secret Ingredient for Better Encryption

Proper data protection is a must for any enterprise, but in the healthcare industry it can become a matter of life and death.
Job Role: Cryptographer Job Role: Cryptographer Job Role: Cryptographer Job Role: Cryptographer

Cryptography is a game that everyone has to play — and it’s still evolving in the age of quantum computing and AI.
Quantum Cryptography Vs. Quantum Hacking: A Cat and Mouse Game Quantum Cryptography Vs. Quantum Hacking: A Cat and Mouse Game Quantum Cryptography Vs. Quantum Hacking: A Cat and Mouse Game Quantum Cryptography Vs. Quantum Hacking: A Cat and Mouse Game

As quantum technology becomes a reality, this cybersecurity quandary has become a true cat vs. mouse game. It’s too early to predict how...
Biometrics: New Advances Worth Paying Attention To Biometrics: New Advances Worth Paying Attention To Biometrics: New Advances Worth Paying Attention To Biometrics: New Advances Worth Paying Attention To

What's happening in the field of biometrics? Some people would say: not much. Some others, who are closer to the industry, would say a lot...
The Future of Sentiment Analysis: A New Twist to the Imitation Game The Future of Sentiment Analysis: A New Twist to the Imitation Game The Future of Sentiment Analysis: A New Twist to the Imitation Game The Future of Sentiment Analysis: A New Twist to the Imitation Game

Emotion analysis has sparked new levels of ingenuity in the processing of data, but there's a long way to go before this imitation game is...
Encryption Vs. Decryption: What's the Difference? Encryption Vs. Decryption: What's the Difference? Encryption Vs. Decryption: What's the Difference? Encryption Vs. Decryption: What's the Difference?

In truth, encryption is rooted in practices that date back thousands of years. The technology and codes have changed, but some of the...
Expert Feedback: What Data Encryption Advancements Should Businesses Be Aware Of? Expert Feedback: What Data Encryption Advancements Should Businesses Be Aware Of? Expert Feedback: What Data Encryption Advancements Should Businesses Be Aware Of? Expert Feedback: What Data Encryption Advancements Should Businesses Be Aware Of?

Since cyberattacks have ramped up over the past few years, data encryption needs to keep pace. But what advancements should be considered...
Encryption Backdoors: The Achilles Heel to Cybersecurity? Encryption Backdoors: The Achilles Heel to Cybersecurity? Encryption Backdoors: The Achilles Heel to Cybersecurity? Encryption Backdoors: The Achilles Heel to Cybersecurity?

Encryption backdoors will clearly and overwhelmingly jeopardize the privacy and security of everyone. The government should ponder on the...
Back to School: Advanced Degrees in Computer Science Back to School: Advanced Degrees in Computer Science Back to School: Advanced Degrees in Computer Science Back to School: Advanced Degrees in Computer Science

If a bachelor’s degree in computer science leads to high demand and salaries, does this mean that an advanced degree in computer science...
Job Role: Data Architect Job Role: Data Architect Job Role: Data Architect Job Role: Data Architect

A guide to what data architects do in modern enterprise IT. Sometimes these professionals seem like the unsung heroes of their departments,...