Verimatrix and Inside Secure have merged. Learn more here. Go to Verimatrix website.

zero day attack

What exactly is a zero day attack?

Quite often you will see news talking about zero-day attacks or vulnerabilities. What does this mean exactly? Here's a short answer to the question.

Feb 14, 2018
true randomness

The Importance of True Randomness in Cryptography

In the world of information security, we often see statements such as ‘secured by 128-bit AES’ or ‘protected by 2048-bit authentication’. We are used to people asking about the strength of the cryptographic algorithms deployed in a security solution. Algorithms such as the AES, RSA and ECC have a proven track record of being difficult to break. They are successfully deployed in protocols that protect on a daily basis our identity and the integrity and confidentiality of our data. Consider as examples the use of SSL or TLS when you buy a book at Amazon or when you connect to your bank account to transfer a sum of money. Or the use of IKE and IPsec when you connect your laptop to the company network to check on your email and read documents stored on the company network.

Jan 29, 2018
Mosaic timeline

MOSAIC: Shaping the future of storytelling takes guts – and security

With today’s newest technology, tools and scalable infrastructure, filmmakers can now bring interactive storytelling to a mass audience. There are many ways of doing that, one of them being the MOSAIC by HBO and Steven Soderbergh.

Jan 23, 2018
Secure mobile apps infographic

Infographic: Facts about secure mobile apps

Here is the latest infographic from Inside Secure. It highlights the importance of secure mobile apps in the future. Payments are steadily getting more and more into mobile. Therefore secure yet usable solutions are needed to develop the technology and keep accounts away from hackers' best efforts.

Jan 7, 2018
SMS authentication

Here’s why you should not use SMS-based two-factor authentication

America’s National Institute for Standards and Technology (NIST) advised the abandonment of SMS-based two-factor authentication already in July 2016. According to NIST, companies that implement new systems should consider alternative authenticators, because of the risk that SMS messages or voice calls may be intercepted or redirected.

Mar 29, 2017

What is eIDAS and how to prepare for it?

On July 1st 2016, the eIDAS Regulation went into effect, aiming to enable mutual recognition and acceptance of electronic identification schemes across EU borders. European Commission was dissatisfied with its predecessor, the E-signature Directive (1999). eIDAS was set out to give consistency to electronic signature regulations in the EU.

Sep 7, 2016