Main Logo

Blog

keys

An introduction to the public key infrastructure

Just using Private Keys is no longer the norm in cryptography today – using a combination of both Public and Private Keys is, and it’s known as “Asymmetric Cryptography.” A type of Asymmetric Cryptography that is deployed widely today is known as the “Public Key Infrastructure,” or PKI for short.

Read More »
Infrastructure

An introduction to public and private keys

As discussed in a previous blog post, cryptography is the science of scrambling and unscrambling a message while it is in transit. The primary purpose of this is to keep the message content safe, in case it is intercepted by a malicious third party.

Read More »
Classroom

Are college students prepared?

For many, a college education is a goal never to be realized. For others, the college education is achieved, but their potential isn’t fully unlocked. When someone graduates from college, are they really prepared for the workforce?

Read More »
Cyberattack

An introduction to cryptography

Cryptography dates all the way back to the times of Julius Caesar. In the simplest terms, the science of cryptography is the scrambling and unscrambling of written messages between two individual parties.

Read More »
Ransomware

Five tips to avoiding ransomware

A recent blog post reviewed what Ransomware is, how it is deployed, and the types of attacks that can occur. Essentially, it is a type of cyber-attack that can lock up your computer screen, your mission critical files, and the data that your company depends on daily.

Read More »
Mind The Gap resize   scaled

Minding the IT skills gap

The curvature at the edge of a London Underground platform, and the shape of the underground trains, leave a significant gap that could prove dangerous for passengers. For years, drivers and station attendants had the job of making sure passengers watched out for that space, or gap.

Read More »
Center LinkedIn Follow Button