In the age of social networks and various more-or-less secure communication tools, it is hard to be at least basically sure that our communication over the Inernet reaches its recipient in unchanged form and confidentiality of such messages is untouched.

■ ■ ■

Security auditing

Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.

■ ■ ■

Latest posts

Cryptoucan™ usage: Display Explained

This week is all about the display of Cryptoucan™. In this blog post we’re going to show you all the indicators, what do they mean and we will even introduce you to some scenarios that will be signaled by it. At the end of the post, you can watch our new video on this topic.

■ ■ ■