51 Results for:MIME

  • Sort by: 

ODI food poverty study shows black families and North East suffering most

By Brian McKenna 09 Oct 2022

A food poverty data report from the Open Data Institute shows black families and the North East of England are suffering the most Read More

What are the top secure data transmission methods?

30 Sep 2020

Safe information transfer is a must for modern organizations, but not all secure data transmission methods are equal. Explore your secure data transfer options in this tip. Read More

Symmetric vs. asymmetric encryption: What's the difference?

By Michael Cobb 22 Jul 2022

Explore the differences between symmetric vs. asymmetric encryption, including how they work and common algorithms, as well as their pros and cons. Read More

No need to panic about Efail attacks

By Warwick Ashford 15 May 2018

Initial reports about vulnerabilities in email encryption technologies have urged organisations to disable encryption tools, but some security experts are taking a more balanced approach Read More

How does site isolation defend against Spectre vulnerabilities?

By Michael Cobb 07 Nov 2018

Spectre exploits how processors manage performance-enhancing features. Expert Michael Cobb explains Google Chrome's initiative to use site isolation as a defense mechanism. Read More

Azure Information Protection P1 vs. P2: What's the difference?

By Reda Chouffani 29 Jan 2021

Azure Information Protection adds security to files such as sensitive emails and files copied to flash drives. See which features Microsoft offers in its two licensing levels. Read More

Efail disclosure troubles highlight branded vulnerability issues

By Michael Heller 16 May 2018

The Efail disclosure process was one day away from completion, but attempts to generate hype for the vulnerabilities led to details leaking earlier than researchers intended. Read More

Envisioning the Global Information Society - The World and Business Computing in 2051

By Philip Virgo 04 Jul 2023

The technologies which will underpin business computing and the global information society in fifty years time are almost certainly already in the laboratories of today. The way they are packaged ... Read More

Comparing Diffie-Hellman vs. RSA key exchange algorithms

By Sharon Shea, Michael Cobb 20 Nov 2019

See which encryption method uses digital signatures, symmetric key exchanges, bulk encryption and much more in this Diffie-Hellman vs. RSA showdown. Read More

Chrome site isolation arrives to mitigate Spectre attacks

By Michael Heller 13 Jul 2018

In an effort to mitigate the risk of Spectre attacks, Google Chrome site isolation has been enabled for 99% of browser users to minimize the data that could be gleaned by an attacker. Read More