ubiq-inner
START NOW
Home
  • Platform
  • Developers
    • Documentation
    • Full API Reference
    • API Status
  • Company
    • About Ubiq
    • Partners
    • Blog
    • Newsroom
  • Pricing
Log In
START NOW

Get the latest from Ubiq

Sign up to get the latest updates from Ubiq.

You can unsubscribe at any time. Read our privacy policy.

  • Show ALL
  • Data Security
  • Encryption
  • DevSecOps
  • Developers
  • Key management
  • Authentication
  • Compliance
  • Privacy
  • Cryptography
  • Android
  • Leadership
  • Transformation

Encryption Simplified Blog | Ubiq Security

The data encryption and key management blog brought to you by Ubiq Security.

Android Authentication Compliance Cryptography Data Security DevSecOps Developers Encryption Key management Leadership Privacy Transformation
How Random is Random?
Data Security, Encryption, DevSecOps, Developers, Authentication, Cryptography

How Random is Random?

John Tyner
January 20, 2021
Bouncy Castle and the Impact of Cryptographic Vulnerabilities
Data Security, Encryption, DevSecOps, Developers, Authentication, Cryptography

Bouncy Castle and the Impact of Cryptographic Vulnerabilities

Eric Tobias
January 19, 2021
Authenticated Encryption: An Explainer
Data Security, Encryption, DevSecOps, Developers, Key management, Authentication

Authenticated Encryption: An Explainer

Gary Schneir
January 12, 2021
Common Challenges with Key Management: Governance (Part 6 of 6)
Data Security, Encryption, DevSecOps, Developers, Key management

Common Challenges with Key Management: Governance (Part 6 of 6)

Eric Tobias
January 4, 2021
Common Challenges with Key Management: Heterogeneity (Part 5 of 6)
Data Security, Encryption, DevSecOps, Developers, Key management

Common Challenges with Key Management: Heterogeneity (Part 5 of 6)

Eric Tobias
January 4, 2021
Common Challenges with Key Management: Availability (Part 4 of 6)
Data Security, Encryption, DevSecOps, Developers, Key management

Common Challenges with Key Management: Availability (Part 4 of 6)

Eric Tobias
December 29, 2020
Common Challenges with Key Management: Security (Part 3 of 6)
Data Security, Encryption, DevSecOps, Developers, Key management

Common Challenges with Key Management: Security (Part 3 of 6)

Eric Tobias
December 29, 2020
Common Challenges with Key Management: Usability (Part 2 of 6)
Data Security, Encryption, DevSecOps, Developers, Key management

Common Challenges with Key Management: Usability (Part 2 of 6)

Eric Tobias
December 21, 2020
5 Common Key Management Challenges (Part 1 of 6)
Data Security, Encryption, DevSecOps, Developers, Key management

5 Common Key Management Challenges (Part 1 of 6)

Eric Tobias
November 24, 2020
Improving Cryptographic Security in Android Applications
Data Security, Encryption, DevSecOps, Developers, Android

Improving Cryptographic Security in Android Applications

Charlie Kahle
November 10, 2020
Zerologon: Why You Should Never “Roll Your Own” Cryptography
Data Security, Encryption, DevSecOps, Developers

Zerologon: Why You Should Never “Roll Your Own” Cryptography

Eric Tobias
November 3, 2020
Don’t just rely on disk encryption as your only encryption strategy. Know the gaps and how to close them.
Data Security, Encryption

Don’t just rely on disk encryption as your only encryption strategy. Know the gaps and how to close them.

Wias Issa
September 23, 2020
How the Capital One breach could have been avoided with application-layer data encryption
Data Security, Encryption

How the Capital One breach could have been avoided with application-layer data encryption

Wias Issa
September 23, 2020
Overcoming OWASP’s sensitive data exposure risk through application-layer data encryption
Privacy, Encryption

Overcoming OWASP’s sensitive data exposure risk through application-layer data encryption

Hwei Oh
September 22, 2020
Curious on how
Leadership, Transformation

Curious on how "Shift Left" is impacting Sales and GTM plans?

Scott McCrady
August 27, 2020
Disclosing data breaches on your own terms
Data Security, Privacy, Compliance

Disclosing data breaches on your own terms

Hwei Oh
August 27, 2020
Some thoughts on moving from an 'open'​ data to a 'closed'​ data world
Data Security, Compliance

Some thoughts on moving from an 'open'​ data to a 'closed'​ data world

Scott McCrady
August 27, 2020
You’re Breached! Encrypting Your Data in The New World of Compliance
Data Security, Privacy, Compliance

You’re Breached! Encrypting Your Data in The New World of Compliance

Ubiq
August 27, 2020

Ready to get started? Create a FREE account instantly and start encrypting data or get in touch to discuss a custom package for your organization.

START NOW
CONTACT SALES
footer-logo
日本語

© 2021 Ubiq Security, Inc.
All rights reserved.

Linkedin Facebook TwitterSlack
Company
  • About
  • Partners
  • Blog
  • Newsroom
Developers
  • Documentation
  • API Reference
  • API Status
  • Community
Resources
  • Contact
  • Support
  • Privacy Policy
  • Responsible Disclosure