In The Trenches Logo The Devolutions Blog
The Front Line Against
IT Chaos & Cyber Threats

Security

What are SPHINX and DE-PAKE?

Introduction I recently came across the “SPHINX: A Password Store that Perfectly Hides from Itself” white paper that was released by IACR’s ePrint repository in July 2018. To be honest, I was not “th...

Are You Being Hacked? 10 Signs to Watch For

This should delight all of the wordsmiths and Jeopardy! fans out there: the word “hack” dates back to the 12th century, and derives from the Old English word “tohaccian”, which means “to hack to piece...

Will Biometrics Replace Passwords?

Over the last couple of decades, and especially in the last few years, the use of biometrics as part of identification and access control has been surging. In fact, by the year 2022, the biometric ind...

Best of the Worst Password Practices

Don’t you hate it when your boss tells you the reasons cyber security is so important and that the organization must adopt a stronger password policy? Seriously — who is your boss trying to impress? ...

Prevent Insiders from Breaching Your Data

Companies like Yahoo, eBay and Equifax all learned the hard way that protecting your data from hackers is of the utmost importance. I mean, a data leak can ruin your company’s reputation forever. But...

How to Protect Your Data at Home

We all know that protecting data at work is a critical priority, since a breach can lead to customer loss, reputation damage, investigation and remediation costs, and possibly even lawsuits, fines and...

6 Tips for Safer Online Shopping

The holidays are here, which means it’s the ideal time to spend time with friends and loved ones, eat way too much food, and of course: shop online in search of great deals. Sadly, however, we aren’t ...