What is DDoS attack? Tragic consequences and prevention of DDoS attack explained Due to the conflict between Russia and Ukraine, the news about DDoS attacks was […]
Encryption is not equal to encryption, but who has the keys? Tools for encrypted communication, resource encryption, are becoming more and more popular. This is due […]
According to Vanson Bourne report 31% of IT decision makers globally noted that their organization requires data to be encrypted whether it’s at rest or in transit and […]
“What strikes me is that Cypherdog looks like a great solution for: security immature organizations who do not have a dedicated security team or many other […]
Speech at the MeetIT conference organized by 3S SA in Katowice on 5.12.2019 entitled “Is 5G + Cybersecurity + Multicloud = 2020?” I recently looked at […]
Although the weather is getting colder outside the window, the days are shorter and the motivation to work seems to be slightly lower, the IT industry […]
Are the mobile messengers secure? We live in times when information has become the highest value good. Access and the ability to use key data allows […]
Cypherdog a breakthrough in communication For whom is secure communication important? If I say that for everyone – it’s true. However, there are professional groups or […]