51 Results for:MIME
- Sort by:
ODI food poverty study shows black families and North East suffering most
09 Oct 2022A food poverty data report from the Open Data Institute shows black families and the North East of England are suffering the most Read More
What are the top secure data transmission methods?
30 Sep 2020Safe information transfer is a must for modern organizations, but not all secure data transmission methods are equal. Explore your secure data transfer options in this tip. Read More
Symmetric vs. asymmetric encryption: What's the difference?
22 Jul 2022Explore the differences between symmetric vs. asymmetric encryption, including how they work and common algorithms, as well as their pros and cons. Read More
No need to panic about Efail attacks
15 May 2018Initial reports about vulnerabilities in email encryption technologies have urged organisations to disable encryption tools, but some security experts are taking a more balanced approach Read More
How does site isolation defend against Spectre vulnerabilities?
07 Nov 2018Spectre exploits how processors manage performance-enhancing features. Expert Michael Cobb explains Google Chrome's initiative to use site isolation as a defense mechanism. Read More
Azure Information Protection P1 vs. P2: What's the difference?
29 Jan 2021Azure Information Protection adds security to files such as sensitive emails and files copied to flash drives. See which features Microsoft offers in its two licensing levels. Read More
Efail disclosure troubles highlight branded vulnerability issues
16 May 2018The Efail disclosure process was one day away from completion, but attempts to generate hype for the vulnerabilities led to details leaking earlier than researchers intended. Read More
Envisioning the Global Information Society - The World and Business Computing in 2051
04 Jul 2023The technologies which will underpin business computing and the global information society in fifty years time are almost certainly already in the laboratories of today. The way they are packaged ... Read More
Comparing Diffie-Hellman vs. RSA key exchange algorithms
20 Nov 2019See which encryption method uses digital signatures, symmetric key exchanges, bulk encryption and much more in this Diffie-Hellman vs. RSA showdown. Read More
Chrome site isolation arrives to mitigate Spectre attacks
13 Jul 2018In an effort to mitigate the risk of Spectre attacks, Google Chrome site isolation has been enabled for 99% of browser users to minimize the data that could be gleaned by an attacker. Read More