Author: Ido Helshtock

colonial pipeline
critical infrastructure security

What We Can Learn in the Aftermath of the Colonial Pipeline Hack

The Colonial Pipeline reportedly paid hackers a ransom of $4.4 million in bitcoin soon after discovering the attack on its systems which began May 6th. In addition, the hackers also stole nearly 100 gigabytes of data from Colonial Pipeline and subsequently threatened to leak it in one of the most high-profile ransomware attacks of the last decade.

Read More »
Secured chip
Artificial Intelligence

Artificial Intelligence and Confidential Computing

Confidential computing is secure computing technology that is designed to ensure that sensitive data in use remains safe, confidential, and accessible to authorized users. Confidential computing eliminates the remaining vulnerabilities created by loosely-defined security protocols, weak perimeter filtering, and inadequate isolation tactics, by protecting data when it is processed in an external and non-secure environment

Read More »
Secure remote voting
blockchain

The Pathway to Secure Remote Voting

In fact, blockchain voting has already been creating waves and changing elections. Overseas military from West Virginia, USA for example can already vote in their local elections using just their mobile phones. A combination of encryption and blockchain registry then tallies their votes.

Read More »