Main Logo

cybersecurity

Pillars

Pillars of a secure organization

Columns, or pillars, have been an architectural staple since as early as 2600 B.C. Every significant civilization of the Iron Age (1300 B.C. to 100 B.C.) used pillars in their architecture. Even to this day, in many instances, those pillars of the Iron Age have proven to withstand the test of time.

Face the music

Time to face the online learning music

The phrase, “time to face the music” started appearing in American literature and verbiage in the mid-19th century. The origin of this phrase is unclear, but there are two good possibilities. The first likely origin came from the tradition of a disgraced military officer being drummed out of their regiment. The second theory is that it’s referring to the moment before an actor would go on stage and face the orchestra pit.

keys

An introduction to the public key infrastructure

Just using Private Keys is no longer the norm in cryptography today – using a combination of both Public and Private Keys is, and it’s known as “Asymmetric Cryptography.” A type of Asymmetric Cryptography that is deployed widely today is known as the “Public Key Infrastructure,” or PKI for short.