Data Protection
Sort by: publishing date popularity
How Do Cryptographic Hash Functions Work?
Cryptographic hash functions are a critical part of many data security algorithms and systems in use today.
10 / 30 / 2018 J.R. Johnivan
Are Your Backups GDPR Compliant?
The General Data Protection Regulations should not be ignored -- find out how to ensure that your backups are compliant.
03 / 11 / 2019 Chris Connor
Asian Countries Rank Poorly for Data Security
11 / 08 / 2016 Joe Keeley
Pentagon Accepting Proposals for $639MM Data Storage Contract
A follow-up to the ESS II contract awarded in 2014, the ESS III promises to tread even more ground in data security and protection.
09 / 04 / 2018 J.R. Johnivan
Did You Celebrate Data Protection Day?
Data Protection Day is a global event designed to educate families and business about the importance of data security.
02 / 09 / 2019 Chris Connor
Video Game Dungeon Defenders 2 Embraces Blockchain
We already know how successful the blockchain is at securing cryptocurrency - but can it do the same for digital video game assets?
10 / 31 / 2018 J.R. Johnivan
How Unwanted Apps May Be Spying On You
Unwanted apps may be collecting data from your phone without your knowledge - and even the ones you know about may be misusing your personal information.
09 / 04 / 2018 J.R. Johnivan