In The Trenches Logo The Devolutions Blog
The Front Line Against
IT Chaos & Cyber Threats

Security

The Ins And Outs Of File-Centric Security

In today’s enterprise, securing your organization’s perimeter isn’t enough. You need to think beyond your business’s walls by considering how remote workers, partners, and suppliers are accessing your...

The Basics of GDPR

Last year around this time, you may recall getting a flurry of emails from various vendors like Google, Apple, and even your friends here at Devolutions, informing you about their obligations and you...

5 Cybersecurity Quick Wins

One of the defining features of cybersecurity is that it is an ongoing (read: endless) commitment vs. a one-time event. Despite this, many IT security professionals are under extreme pressure to produ...

What are SPHINX and DE-PAKE?

Introduction I recently came across the “SPHINX: A Password Store that Perfectly Hides from Itself” white paper that was released by IACR’s ePrint repository in July 2018. To be honest, I was not “th...