Securing Windows 10 – Part Two “Cryptography”
Today we are going to explore the possibilities offered by one of the most important conquers when it comes to protect (personal) data at rest, the encryption, which is the…
Today we are going to explore the possibilities offered by one of the most important conquers when it comes to protect (personal) data at rest, the encryption, which is the…
In recent months, in accessing websites, we are seeing a new way of presenting cookies more and more frequently.Next to the well-known banner with the button: "accept cookies" there is…
Recent events turned a light on IT security threats, not only for companies who usually pay higher attention to this type of topics, but also for end users. The rapid…
The advent of the GDPR in Europe and the CCPA in the United States have raised emphasis on PII processing, and on data breaches increasing every. This is where a…