Encrypting Passwords

Encrypting Passwords

Are Passwords Encrypted? Passwords are one of the most important security features available today. Creating secure and unguessable passwords is becoming more complex, let alone remembering the many passwords we use daily. Many websites are programmed not to allow...
Hashing and Cryptographic Hash Functions

Hashing and Cryptographic Hash Functions

What Are Cryptographic Hashes? If you’ve found yourself wondering what exactly hashing is, it’s essentially a mathematical algorithm mapping and compressing data. This can be any data – a name, date of birth, a file, or a transaction. The data can be any size...
Asymmetric Vs Symmetric–What’s the Difference?

Asymmetric Vs Symmetric–What’s the Difference?

Encryption is critical to protecting sensitive information. A lack of encryption has led to massive data breaches, including a Microsoft customer support database of over 280 million customer records, a 500K breach of Zoom accounts, and much more. In previous...
Encryption: Understanding Data At Rest Vs. In Transit

Encryption: Understanding Data At Rest Vs. In Transit

Many people assume that when information isn’t being transmitted, it’s safe. But to effectively encrypt personally identifiable information, many variables must be considered, including the state the data is in. In order to understand how to encrypt data in various...