What is perfect secrecy? Defending intellectual property when the hacker has unlimited resources.
Perfect secrecy, as the name begins to suggest , refers to a state in which no recognisable information whatsoever can be extracted from an encrypted data package. Perfect secrecy, closely linked to a form of cipher known as a one-time-pad, was originally proven by Claude Shannon in a 1945 paper. With quantum computing on the (more...)
MX in the news: Testing Simulation. Stolen! Engineering IP Theft.
Engineering data is a valuable target, and the aerospace and automotive industries are at an increased risk of commercial espionage, theft of engineering intellectual property and cyber vandalism. Testing & Simulation Review has brought together Simon Ordish (Majenta Solutions MX Director) and Charlie Brown (Anzen Technologies cybersecurity architect) experts in their industries, to highlight these (more...)
MX in the news: Just Auto. Data security in the automotive industry
MX ASR has been featured in a Just Auto article in which Simon Ordish (Director) shares Majenta's outlook on the widespread theft of intellectual property within the automotive industry. The article highlights how the unique and newly developed sharing technology of MX ASR could be a solution to this issue as it allows complete anonymisation (more...)
Homing in on MFA’s drawbacks – nailing hybrid workforce authentication in your cyber strategy
Cyber security strategies must account for a new reality which has emerged in the two years since IT and security professionals scrambled to secure the transition to remote working. The home is now part of the corporate network – and authenticating access to critical applications and systems by remote workers is becoming a security strategy (more...)
MX in the news: Security Week. The ‘harvest now, decrypt later problem’.
MX ASR – a next-generation secure data sharing solution – has been featured in a security week article for its innovative solution to a potentially costly cyber security issue. The article, in a publication providing cybersecurity news and analysis, outlines profound implications for protection of corporate intellectual property which can be achieved by a UK firm’s innovative application of a technology more commonly associated with databases: sharding.