top of page

LATEST
Search


AES-256 vs. AI: Why Traditional Encryption Can’t Withstand Recursive Cryptanalysis
AI-driven Data Attacks (AIDA) systematically decrypting AES-256 encryption using recursive cryptanalysis. A futuristic cybersecurity...
Richard Blech
Mar 18


Strong Cryptosystems Needed for Resource-Constrained IoT
You don’t have to look too far to find small network-connected devices feeding vast amounts of telemetry data into public cloud...
Richard Blech
Feb 22, 2022


SD-WAN Protecting Data to the Cloud
The modern, cloud-centric business model has become the norm and requires networks that are both reliable and secure. But widescale cloud...
Richard Blech
Feb 14, 2022


Protecting Against Encrypted Log4j Attacks
Even though CISA officials stated earlier this month that the Log4j security vulnerability (CVE-2021-44228) has not resulted in any major...
Richard Blech
Feb 7, 2022
bottom of page