In the age of social networks and various more-or-less secure communication tools, it is hard to be at least basically sure that our communication over the Inernet reaches its recipient in unchanged form and confidentiality of such messages is untouched.■ ■ ■
Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.■ ■ ■
After some months of intensive testing and specifying all the details of the batch manufacturing process, we have given it a green light and in a few weeks, we expect to have first hundreds of Cryptoucans™ in stock. Read on to see what the final stages of testing were like.