PKI

Authentication vs. Encryption

Authentication and encryption are two critical functions at play in cybersecurity infrastructure. Both processes contribute to the security of your data, but they serve different purposes. What is Authentication? Authentication is a critical component of modern information systems, as it helps ensure that only [...]

Authentication vs. Encryption2023-02-23T15:47:50+00:00

The Future Cybersecurity Landscape *WEBINAR* with QWERX CTO John Ellingson

Register Now Register today to hear QWERX Chief Technology Officer John Ellingson discuss the future cybersecurity landscape in a webinar hosted by Mike Wardle of Z/Yen. When: Tuesday, February 28th at 10:00am EST Cost: Free Background: Edward Tenner writes about the revenge effect [...]

The Future Cybersecurity Landscape *WEBINAR* with QWERX CTO John Ellingson2023-02-16T15:08:29+00:00

The Snapchat of Secure Authentication

What makes Snapchat unique from other social media platforms is all about what users can't do -- view a post more than once. After a user views a photo or video, the post "self-destructs" and can't be retrieved. The privacy protections of self-destructing information [...]

The Snapchat of Secure Authentication2023-02-15T15:55:12+00:00

Disappearing Keys are Impossible to Steal: the Case for Ephemeral Credentials

One of the reasons we have so many identity-related data breaches is that today's security infrastructures rely on static credentials that can be exploited. Certificates and keys must be stored and managed, which is why certificate-based environments continue to suck up more and more of [...]

Disappearing Keys are Impossible to Steal: the Case for Ephemeral Credentials2023-01-31T17:19:33+00:00

The Best Quantum Resistant Algorithm is NO Algorithm

Quantum computing presents a unique challenge for modern computing, as it has the potential to completely break the cryptographic algorithms that are currently used to secure data. New algorithms have been designed to be resistant to attacks from quantum computers, but it is becoming increasingly [...]

The Best Quantum Resistant Algorithm is NO Algorithm2023-01-25T17:18:53+00:00

What Is Public Key Infrastructure and How Is QWERX Better?

Public key infrastructure (PKI) underpins most of the protected networks today. PKI uses a combination of public and private keys to authenticate users and devices. Although it’s widely used, PKI can be grouped with other outdated cybersecurity tactics like multi-factor authentication, which presents only a [...]

What Is Public Key Infrastructure and How Is QWERX Better?2022-09-19T17:42:56+00:00

Wake Up Neo, The Metaverse is Calling

The Metaverse:  A total convergence of AI, Work From Home, Telemedicine, Gaming, Fintech, Cryptocurrency, infotainment, Call of Duty, e-Commerce, Sports, Streaming video and anything else you can push over a network. It is the next generation information system, the result of the evolutionary and revolutionary [...]

Wake Up Neo, The Metaverse is Calling2022-04-25T23:40:37+00:00

The Universe is Random. Now You Know.

"True randomness is everywhere in nature." Natural Randomness is not the same as attempted randomness from random numbers. There. We said it. Noted Princeton physicist John Archibald Wheeler, whose students included Kip Thorne and Richard Feynman, postulated that the universe was not composed of matter [...]

The Universe is Random. Now You Know.2022-04-27T19:22:31+00:00

Colonial Pipeline Attack: Getting to the Root Cause

A recent article provides an excellent analysis of the Colonial Pipeline ransomware attack. Underlying the analysis is that, absent the use of public-key infrastructure (PKI), none of these attacks would have happened. More worrisome is that virtually every recently breached entity (and virtually every enterprise [...]

Colonial Pipeline Attack: Getting to the Root Cause2022-04-28T14:15:06+00:00

Colonial Pipeline Hack Highlights PKI Vulnerabilities

The successful cyberattack on the Colonial Pipeline underscores the vulnerability of our critical infrastructure. Most probably, the pipeline was as well protected from cyberattack as it could have been.  Nevertheless, the current state-of-the-art still favors the attacker over the defender.  Even the most conscientious CISO [...]

Colonial Pipeline Hack Highlights PKI Vulnerabilities2022-04-28T14:37:20+00:00
Go to Top