Posts

data transmission

More than Just Data: The 4th Industrial Revolution

Prior to the US presidential election back in 2016, most of the…
hospital
powerplant

Are Your Country's Canals, Dams, and Power Plants Safe from Hackers?

In 1999, a 16-inch fuel line ruptured in the US spilling…
Biometric Authentication

What is the Most Secure Authentication Method?

We’ve been enjoying using signing and authenticating technologies…
Security Weekly - Israel

[Security Weekly] Personal Information of All 6.5 Million Israeli Voters Exposed

2nd Week of February 2020   1. Personal information of…
talenta penta security partnership cryptocurrency security

Penta Security Partners with Talenta to Accelerate Crypto Asset Security

Penta Security Systems Inc. is expanding the reach of its…
CryptoXchange

Penta to Safeguard Token Exchanges Against Hacking

Penta Security Systems Inc. closes the security gap in the blockchain…
cryptocurrency wallet

Storing Cryptocurrency: What the Hot and Cold Talk is About

When it comes to traditional forms of money like the dollar…
non password authentication fingerprint biometrics green turquoise

No Passwords Required? The Trends of Non-Password Authentication

In the past we’ve talked quite a bit about authentication and…
iphone x biometric face ID

iPhone X’s Facial Recognition…Trendy Feature or Security Issue?

Undoubtedly, iPhone X was one of the hottest tech devices…