Encryption

24 May 2022

You can have the data encrypted but who has the keys?

You can have the data encrypted but who has the keys? Cypherdog provides truly confidential communication We talked with Przemek Kucharzewski, a co-founder and VP of […]
20 May 2022

Whistleblowers – anonymously and safely

Whistleblowers – anonymously and safely The Council of the European Union adopted a directive on the protection of persons who report breaches of the law, i.e., […]
11 May 2022

Cypherdog Status Report (January-April, 2022)

In this update, we share with you the main developments from 2022. Company In the first quarter, Cypherdog expanded its team. As the company grew, the […]
5 May 2022

Is there an enemy behind software?

Is there an enemy behind software? War and software The outbreak of the war on February 24, 2022, between Russia and Ukraine meant that everyone using […]
19 April 2022

Cybersecurity in times of war

Cybersecurity in times of war Can we feel safe? From the start of Russia’s military invasion of Ukraine, the number of ransomware attacks has increased fivefold […]
5 April 2022

Why Data Protection in your Consulting Company is Failing?

Why Data Protection in your Consulting Company is Failing? Ever wondered what would happen if documents were sent to Your client – audit results, documents of […]
3 April 2022

Here’s What Can Happen If You Don’t Keep Data Protected In Your Accounting Office

Here’s What Can Happen If You Don’t Keep Data Protected In Your Accounting Office Ever wonder what would happen if documents were sent to Your client […]
1 April 2022

Do you think that Data Protection in your Law Firm is sufficient?

Do you think that Data Protection in your Law Firm is sufficient? We are here to tell you you are most likely wrong! Ever wondered what […]
30 March 2022
Blockchain and cybersecurity

Blockchain and cybersecurity

Blockchain and cybersecurity Blockchain, according to many IT specialists, is still an underestimated technology, which became famous because of cryptocurrencies. Cryptocurrencies are just a niche application […]