Blog

News and articles

No more dongles

09 Oct, 2018 by James Chapman

One of the biggest issues in security today is that of secure identification and the misuse of stolen credentials to gain fraudulent access. This is highlighted in recent Verizon Data Breach…

How can Two-Factor Authentication Protect your Brand?

13 Feb, 2018 by MIRACL Blogger

What do Yahoo!, Equifax, and eBay all have in common aside from data breaches on an epic scale? They all rely on a user’s trust across digital networks to move their businesses forward. If y…

How can you Easily Protect Citizen and Consumer Data?

01 Feb, 2018 by MIRACL Blogger

Your end user has a relationship with your business application for only one reason. To do business with you. Anything that interferes with the security of that relationship not only disrupt…

How Regulated Industries can Easily Comply with Security Requirements

18 Dec, 2017 by MIRACL Blogger

Europe’s financial institutions are sleepwalking into a regulatory nightmare with security systems that are not fit for purpose to meet the requirements of the European Union’s revised Direc…

The Simple Commandments You Should Learn to Avoid Leaking Secrets

06 Dec, 2017 by Dr Michael Scott

Often a competent and experienced software engineer is tasked to implement a cryptographic algorithm. Unfortunately they may be unaware of what we call side-channels attacks. For example nor…

Stop the Hackers: Here's How to Remove Your Password Database

30 Nov, 2017 by MIRACL Blogger

There are two key questions anyone associated with business and data need to ask themselves: Does our company still have a password database and, if so Why? The simple fact is that there i…

Post Quantum Identity Based Encryption

13 Nov, 2017 by Dr Michael Scott

In our last blog, “Post Quantum Cryptography for Grandparents”, (which you really need to read first before reading this one) we pointed out that Post-Quantum cryptography as bas…

How to Explain Post Quantum Cryptography to Anyone

02 Oct, 2017 by Dr Michael Scott

Its actually not as complicated as it sounds. Let’s get the maths over with first. Remember polynomials? (x+1)(x+1)=x2+2x+1 This would be an example of two first degree polynomials bei…

First Hybrid, then fully Post Quantum

15 Aug, 2017 by Dr Michael Scott

As we are all aware we are on the cusp of a major revolution in the auto-mobile industry. In 20 years we will all be driving electric cars and the good old petrol engine will be something we…

PSD2 - What Will Your Bank Do?

30 May, 2017 by MIRACL Blogger

In 2018, PSD2, the revised Payment Service Directive will be implemented which will change banking as we know it. Banks and payment services will be required to comply with new legislation w…

Bad Medicine - The Evolution of Computer Security

18 May, 2017 by Dr Michael Scott

It’s interesting to compare progress in Computer Security with progress in Medicine Science. Think of computing technology as being analogous to the human body, and under attack from m…

Why Does Your Business Still Have This Cyber Security Risk?

03 May, 2017 by MIRACL Blogger

In today’s online world of increasing digital crime, internet fraud and database breaches, businesses are left with the growing worry about protecting their online commerce and custome…