Technology
"Data Security" is one of those buzzwords that people use for many different solutions. It is not a big surprise since most people in IT talk abou...
Mon, 1 Nov, 2021 at 10:38 AM
To be able to encrypt something, there must already exist a corresponding decryption key. This is of course a problem if you don't know all receivers o...
Mon, 1 Nov, 2021 at 10:38 AM
In the HYKER crypto system both symmetric and asymmetric crypto keys are used. A symmetric key is tied to a document. A asymmetric key-pair is tied to ...
Mon, 1 Nov, 2021 at 10:38 AM
NB. this functionality is still in beta and will soon be released publicly. Click here for a demo on how it will work. 2FA or two-factor authentication ...
Mon, 1 Nov, 2021 at 10:38 AM
Intel Software Guard Extensions (SGX) is a new technology that enables so-called secure enclaves that are processes that are protected from processes runnin...
Mon, 1 Nov, 2021 at 10:39 AM
Blockchains are important and disruptive. They establish trust between parties and transaction authenticity, without having a central authority. But smart c...
Mon, 1 Nov, 2021 at 10:39 AM
There are 2 scenarios for key revocation in Hyker First case (public keys used for identification of users/devices): Public key revocation in Hyker works ...
Mon, 1 Nov, 2021 at 10:39 AM
For a secure system, there are a number of security categories that needs to be addressed. The most important: Endpoint device protection User access a...
Mon, 1 Nov, 2021 at 10:39 AM
Hyker is not network defence, Hyker protects data anywhere, over time, in transfer and at rest. For a secure system, there are a number of security categor...
Mon, 1 Nov, 2021 at 10:39 AM
Hyker does not require hardware. Hyker is also agnostic to all communication protocols, platforms and devices, if it has enough processing capabilities. Ma...
Mon, 1 Nov, 2021 at 10:39 AM