<img alt="" src="https://secure.weed6tape.com/193471.png" style="display:none;">

SECUROSYS BLOG

Why a hardened server is not good enough to store crypto assets and how to reliably store crypto assets

Blockchain technology can dramatically improve retail efficiency by enabling fully digital processing and eliminating unneeded intermediaries. It is used for tokenized goods, smart contracts and crypto currencies. However, a challenging problem..

23.05.2024
Read more
Quantum Computers -  A threat for PKI?

Photo Credit: IBM quantum computer. An IBM Q cryostat used to keep IBM’s 50-qubit quantum computer cold in the IBM Q lab in Yorktown Heights, New York. What are the prerequisites for a secure PKI today? Will quantum computers make PKIs obsolete in..

23.05.2024
Read more
GDPR Database Encryption

GDPR mandates that as from May 28 2018 on data of natural persons from the EU, such as customer data is safeguarded and access to is controlled. The only technical measure mentioned in the law is encryption.

23.05.2024
Read more
How to keep your business running in a world full of cyber security risks

Cyber security is a constant topic in the news. There is not a single day without the headline that passwords were stolen, companies breached, or data or bitcoins lost. The list seems endless. As the CEO of Securosys I regularly get asked whether..

09.08.2022
Read more
Segregation of Duties done right

Many business processes can be problematic or faulty if they are carried out by a single person in a company. The principle of segregation of duties (SoD) is used to prevent this. Segregation of duties is crucial for effective internal control as it..

05.05.2022
Read more
Escape Ransomware and Data Theft

In light of recent large-scale attacks on hundreds of companies by cybercriminal groups, the question is how to take precautions. Ransomware criminals encrypt the victim's data and promise to hand over the key in exchange for the ransom. The best..

19.07.2021
Read more