In the age of social networks and various more-or-less secure communication tools, it is hard to be at least basically sure that our communication over the Inernet reaches its recipient in unchanged form and confidentiality of such messages is untouched.

■ ■ ■

Security auditing

Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.

■ ■ ■

Latest posts

Cryptoucan™ usage: Installing on macOS

We haven’t forgotten about you, macOS users! Firstly, we’re going to teach you about macOS and Thunderbird email client. In today’s article, you will learn what software you need to use your Cryptoucan™ with and how to install it. Don’t worry, the article is accompanied by an instructional video of our production – as always.

■ ■ ■