Blog - Page 3 of 5 - Cypher.dog

Blog

 

Blog

The cybersecurity specialists and enthusiasts who care
about the highest quality of Cypherdog products

 
1 June 2022

In this update, we share with you the main developments from May

Company Due to Cypherdog’s global expansion plans and rapid growth, specialists from all over the world have joined our thriving team. Their tasks, among others, include […]
24 May 2022

You can have the data encrypted but who has the keys?

We talked with Przemek Kucharzewski, a co-founder and VP of Sales at Cypherdog Security Inc., about the confidentiality and security of data, the effects of data […]
20 May 2022

Whistleblowers – anonymously and safely

Whistleblowers – anonymously and safely The Council of the European Union adopted a directive on the protection of persons who report breaches of the law, i.e., […]
11 May 2022

Cypherdog Status Report (January-April, 2022)

In this update, we share with you the main developments from 2022. Company In the first quarter, Cypherdog expanded its team. As the company grew, the […]
5 May 2022

Is there an enemy behind software?

Is there an enemy behind software? War and software The outbreak of the war on February 24, 2022, between Russia and Ukraine meant that everyone using […]
19 April 2022

Cybersecurity in times of war

Cybersecurity in times of war Can we feel safe? From the start of Russia’s military invasion of Ukraine, the number of ransomware attacks has increased fivefold […]
5 April 2022

Why Data Protection in your Consulting Company is Failing?

Why Data Protection in your Consulting Company is Failing? Ever wondered what would happen if documents were sent to Your client – audit results, documents of […]
3 April 2022

Here’s What Can Happen If You Don’t Keep Data Protected In Your Accounting Office

Here’s What Can Happen If You Don’t Keep Data Protected In Your Accounting Office Ever wonder what would happen if documents were sent to Your client […]
1 April 2022

Do you think that Data Protection in your Law Firm is sufficient?

  Do you think that Data Protection in your Law Firm is sufficient? We are here to tell you you are most likely wrong! Ever wondered […]
30 March 2022

Blockchain and cybersecurity

Blockchain and cybersecurity Blockchain, according to many IT specialists, is still an underestimated technology, which became famous because of cryptocurrencies. Cryptocurrencies are just a niche application […]
19 March 2022

Pen tests. Conduct, automate or not worry?

Pen tests. Conduct, automate or not worry? he statement that prevention is better than cure also applies to the health of your company’s IT infrastructure and […]
12 March 2022

What is DDoS attack?

What is DDoS attack? Tragic consequences and prevention of DDoS attack explained Due to the conflict between Russia and Ukraine, the news about DDoS attacks was […]
This website uses cookies to improve your experience. By using this website you agree to our Privacy Policy.
Compliance
Read more