article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats. While cryptology is thousands of years old, modern cryptography took off in the 1970s with the help of the Diffie-Hellman-Merkle and RSA encryption algorithms.

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

Be it advanced locks, encryption barriers, or deleted and unknown content, the UFED (Universal Forensic Extraction Device) can extract physical and logical data. ProDiscover launched in 2001 to help public and private organizations solve digital crimes. ProDiscover.

Software 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Noname API security 2021 Private Qualys Security and compliance 2020 Nasdaq: QLYS Attivo Networks Identity solutions 2017 Acquired: SentinelOne AlienVault Enterprise cybersecurity 2012 Acquired: AT&T Zone Labs Endpoint security 2001 Acquired: Check Point. AllegisCyber Capital. Greylock Partners. NightDragon.

article thumbnail

Cyber CEO: The History Of Cybercrime, From 1834 To Present

Herjavec Group

government websites in 1998 and is sentenced to 18 months in prison in 2001. 1999 — NASA and Defense Department Hack — Jonathan James, 15, manages to penetrate U.S. 2014 — eBay — A cyberattack exposes names, addresses, dates of birth, and encrypted passwords of all of eBay’s 145 million users. . presidential election.