19
Feb

The Footprint of MD5 security on Digest Authentication

MD5 is a Hashing algorithm, which is a one-way cryptographic function which accepts the message of any length as input and returns as output a fixed-length digest value to be used for authenticating the original message. MD5 calculations which are used in HTTP digest authentication is “One-Way” which means that it is difficult to determine … Continue reading “The Footprint of MD5 security on Digest Authentication”

18
Jan

Cyber Security and Machine Learning: The Unexplored Dimensions!

The world has become prone to technology and devices. Computers and the internet have become essential and a crucial factor here. The advancement of smart devices and wireless devices such as Wi-Fi, Bluetooth have taken the world to the next level. Each and every day there is a new technology invented and also version releases … Continue reading “Cyber Security and Machine Learning: The Unexplored Dimensions!”

02
Nov

What is Adaptive Security Architecture and how it will protect your business?

Adaptive Security Architecture deals with the behaviors and events to protect against and adapt to threats before they happen. This is one of the approaches of CyberSecurity. With Adaptive Security Architecture, the organization can assess risk and automatically provide proportional enforcement that can be dialed up or down. But as we now know, and industry … Continue reading “What is Adaptive Security Architecture and how it will protect your business?”