Senetas logo

security@senetas.com

GlobalCare Support Partner Portal
Show navigation Hide navigation
  • Encryption Overview
    • Network Security Use Cases
    • Encrypting Network Data
    • Multi-Layer Encryption
    • Certified High-Assurance Encryption
    • Bringing Agility To Cryptography
    • Encryption Key Management
  • Products
    • CN Series Hardware Encryptors
    • CV Series Virtualised Encryption
    • SureDrop Secure File Sharing
    • Votiro File Disarmer
    • CM7 Network Encryption Management
    • GlobalCare Maintenance & Support
  • Applications
    • Cloud Services and Networks
    • Data Centre Interconnect
    • Protecting Big Data In Motion
    • Multi-Location Organisations
    • SCADA & Industrial Control Networks
    • Real-Time CCTV Networks
  • Customers
    • Commercial
    • Defence
    • Energy and Utilities
    • Financial
    • Gaming
    • Government
    • Healthcare
  • Resources
    • Audio and Video
    • Case Studies
    • Frequently Asked Questions
    • Glossary of Terms
    • Infographics
    • Product Details
    • Solution Papers
    • Technical Papers
    • White Papers
  • Partners
    • International Distribution
    • Government & Defence
    • Partners – Australia & New Zealand
    • Partners – International
    • Technology Partners
    • Become a Senetas Partner
    • Partner Portal Login
  • About
    • Contact Us
    • Senetas Corporation Limited
    • Investor Relations
    • The History of Senetas
    • Board of Directors
    • Customer Support Information
  • What’s New
    • Encryption News
    • Senetas Blog
    • Live Events
    • Senetas View
  • GlobalCare Support
  • Partner Portal

Senetas Blog

Home / Senetas Blog

Cyber security regulations – act now or pay the price

There was a time when governments and their agencies were at the forefront of cyber-security initiatives. However, the number of high profile data breaches throughout 2015 and 2016 indicate they have picked up some bad cost-cutting or corner cutting habits. Similarly, the...

Quantum cryptography for long-term data protection

In recognition of the emerging quantum threat, government and industry experts across the globe are advising organisations of all types to invest in quantum-safe encryption solutions. As we approach the dawn of the quantum era, network data security needs to stay one step ahead...

Decoding the GDPR and global data protection regulations

Set to become law in May 2018, one of the major talking points of the legislation has been the hefty financial penalties proposed as a result of non-compliance. Organisations suffering a data breach can expect to be fined up to 4% of their annual turnover or €20 million,...

Vulnerable network devices highlight the need for encryption

As if security-aware organisations needed another reminder that data network security is only as strong as its weakest link. PC World reveals yet another extraordinary story about vulnerable network devices – 840,681 of them to be exact. These stories are becoming commonplace...

Transmission Flow Security

It may be surprising to know how much hackers and cyber-criminals learn from data networks’ traffic. This is done through a process referred to as ‘traffic flow analysis’. While once underestimated, traffic flow analysis is now gaining attention beyond the government and...

High-assurance encryption for financial services

Last year was another big year for data breaches, and not in a good way. Gemalto’s breach level index is an online record of data breach incidents and reveals over 3.7 billion records have been lost since 2013.

High-Assurance Encryption. If it’s not broken, don’t fix it!

There may be no more important data security topic today than law enforcement’s persistent calls to weaken ‘unbreakable’ encryption (the FBI’s term for high-assurance encryption) by forcing vendors to add backdoors to their security products.

Network Traffic Flow analysis protection enhances encryption

Within a commercial setting, it is the analysis of large volumes of metadata, and the insights that can be gleaned from this analysis, that is likely to be of greater concern. Ducklin does a good job here of illustrating the risks and the types of insights that can be extracted...

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • View All
Contact Us
Senetas logo white
  • Senetas LinkedIn
  • Senetas Twitter
  • Senetas YouTube
  • Site Map/
  • Privacy Policy/
  • Terms & Conditions

Senetas is a leading developer of encryption security solutions; trusted to protect enterprise, government, defence, Cloud and service provider data in over 35 countries. From certified high-assurance hardware, and virtualized encryption, to secure file sharing with data sovereignty control, all are based on the same crypto-agile platform and deliver security without compromise.


CommonCriteria_white CommonCriteria_white
© copyright 2019
Back to Top

Partner Portal Login

Remember Me
Forgot Password?
Join Us

Subscirbe to the Senetas View

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy

Necessary Always Enabled