Author name: Ciphertex Admin

Cyber Security in the Age of Information: Military-Grade Encryption to Protect Your Data

Military-grade encryption delivers extreme security to military and government entities, and is also available to the public via commercial products. Here we explore military-grade encryption and the benefits it can offer home and business networks. Security That’s Virtually Unbreakable “Military-grade” refers to AES-256 encryption. This standard was established in order to be in compliance with […]

Cyber Security in the Age of Information: Military-Grade Encryption to Protect Your Data Read More »

What Is Encryption Security?

Encryption protects data by “scrambling” it into an indecipherable code that can only be unscrambled by an authorized recipient. Though encryption methods and types vary between applications, encryption has become a necessary security measure for almost every digital application. Just how exactly does encryption work, and what are the benefits of adopting it? Read on

What Is Encryption Security? Read More »

Ciphertex: Who Are We?

Ciphertex Data Security® is trusted around the globe to provide solutions for data encryption, storage, and transportation. Our products and services are used by military organizations, government agencies, industry leaders, businesses, and personal users. With advanced AES 256-bit encryption technology, these devices are powerful enough to keep even your most sensitive data secure. How do

Ciphertex: Who Are We? Read More »

Data Encryption

In a substitution cipher, single letters, pairs of letters, or groups of three letters (or any combination of these) are changed, but the order of the letters stays the same. Simple substitution ciphers use single letters, whereas polygraphic ciphers use larger groups of letters. In plain terms, letters are substituted for other letters. In the

Data Encryption Read More »

Which Industries Need Reliable Data Security?

As organizations capture and store more data than ever, many industries now adopt data-driven technologies and solutions to streamline workflows and gain new insights. However, these advancements come at a cost: Because much of this data is sensitive, industries must implement reliable data security measures to protect both their operations and their customers Why Is

Which Industries Need Reliable Data Security? Read More »

Cybersecurity Accountability Spread Thin In The C-suite

Cybersecurity Accountability Spread Thin In The C-suite While cybersecurity discussions have permeated board meetings, the democratization of accountability has a long way to go. Cybersecurity Enters the Boardroom—but Lacks Follow-Through A spate of recent surveys offer indications that the philosophy that “cybersecurity is everyone’s responsibility” is gaining steam in the C-suite at most large organizations.

Cybersecurity Accountability Spread Thin In The C-suite Read More »

Nist Special Publication 800-88 Revision 1 Data Sanitation Conformity . . . Without A Sledgehammer!!!

You can put away that sledgehammer now!!! National Institute of Standards and Technology (NIST) SP 800-88 Rev 1 conformity for data sanitation is offered within the Ciphertex SecureNAS® product line. There are three levels of data sanitation defined by the 800-88 standard, Destroy, Clear and Purge. Destroy (aka The Sledgehammer) is exactly what its name

Nist Special Publication 800-88 Revision 1 Data Sanitation Conformity . . . Without A Sledgehammer!!! Read More »

Desjardins, Canada’s largest credit union, announces security breach

Today, Desjardins, Canada’s largest credit union and one of the world’s biggest banks, announced a security breach caused by a former employee. In a statement posted on its website, the bank said a bank employee had taken the data of 2.9 million members (2.7 million home users and 173,000 businesses and associated contacts) from its

Desjardins, Canada’s largest credit union, announces security breach Read More »

Scroll to Top