Latest Posts
- Cord3 Innovation | Data-Centric Security Innovation Inc. is thrilled to be at CANSEC 2024 with our amazing Microsoft partner and team!! -
- 2024 Carleton University Winter Virtual Career Fair -
- Cord3 is proud to announce that the United States Patent Office has granted Cord3 another patent in the field of Zero Management Symmetric Key infrastructure (USPTO US 11,728,983). -
- Cord3 has been featured in the book entitled “Safety and Security Science and Technology” -
Contact Us
900 Morrison Drive Suite 202
Ottawa, Canada
info@cord3inc.com
+1 343 488 8720
Transparent Encryption
/in Quantum-Ready Cryptography, Resources /by mmstaff“Why is encryption software so horrid to use?” The long answer to that question is complex and diverse. The short answer is that encryption comes in two fundamental forms and one of the forms is actually easy to use – that form is “in transit” encryption, like SSL and VPN. The second form – encryption “at rest” – is a completely different story.
Stop Privileged Credential Abuse
/in Privileged Credential Abuse, Resources /by mmstaffPrivileged credential abuse has been traditionally difficult to detect and stop because data security is tightly integrated into applications and applications grant unrestricted access to privileged credential users, including access to sensitive data. Cord3 separates data security from applications. This separation of data security from applications enables two critical capabilities for protecting sensitive data against privileged credential abuse.
Achieve Data Governance
/in Data Governance, Resources /by mmstaffTraditionally, every application has implemented data security its own way, with its own policies, settings, and algorithms. The result is too complex and costly for users and administrators. And auditors, too.
You want consistency. Consistency gives you data governance you can manage and control. And audit.
Cord3’s Encryption
/in Encryption, Quantum-Ready Cryptography, Resources /by mmstaffQuantum computers are only projected to “completely break” public-key cryptography algorithms. Quantum computers are not projected to be able to compromise good symmetric cryptography algorithms, such as the Advanced Encryption Standard (AES) algorithm used by Cord3 and many other encryption technologies, provided strong encryption keys are used.
How Strong are 256-bit Symmetric Keys?
/in Encryption, Quantum-Ready Cryptography, Resources /by mmstaffUsing strong, random symmetric keys means an attacker –even one using a quantum computer years from now –has to search through an incredibly large number of keys to be able to find the right one. Even the most powerful conventional computers and quantum computers conceivable would require many, many millions of years to find a key.