There is tremendous buzz around ChatGPT and the exciting combination of Wolfram/Alpha. The question of our time is how do you create an Ai you can trust and provide informational outputs you can trust? Ultimately, any Ai system is only as good as the data it has to draw from. Meaning bad data creates bad […]
The most secure and easiest way to send massive files to anyone.
Secured2’s mission has always been to secure the world’s information and bring back digital privacy. There is no question that TRUST is critical to realizing our vision, as well as for our business and we work tirelessly to earn it every day with our customers. We promote often our quantum computing safe security technology that […]
Artificial Intelligence has a bright future, but storm clouds are coming
Artificial Intelligence (AI) touches our lives every day. It is driving everything from what searches we see on Google to managing our air traffic systems. What has amazed me the most is how AI has been quietly integrated into the back end of many of the systems we use each day, transforming our world, making […]
Your email is not safe. Protect yourself right now.
If you are like me, I never blinked when sending an email. Yet, in today’s world, every piece of digital information you send can be hacked, monetized, or profiled. This is especially true if you use any of the many cloud-based email providers. Can we honestly say that email is secure? Can we really trust […]
Why most quantum encryption efforts are failing
As quantum computers move from the lab into operation, companies are rushing to develop post quantum encryption. You hear terms like quantum safe, quantum-proof, quantum safe, quantum encryption, and quantum cryptography used frequently. There are now many terms to describe similar approaches to protecting data and ensuring secure communications. So, how do you make sense […]
The evolution of our encrypted systems & the quantum threat
Traditional encryption has been described as taking data as input (called plaintext) and transforming the plaintext into an output (called ciphertext) which is now protected. This is done through an algorithm, such as the AES. AES encryption requires a ‘secret’ or ‘key’ to unlock or decrypt the ciphertext back into its plaintext format. This security […]
The most secure and easiest way to send massive files to anyone.
Secured2’s mission has always been to secure the world’s information and bring back digital privacy. There is no question that TRUST is critical to realizing our vision, as well as for our business and we work tirelessly to earn it every day with our customers. We promote often our quantum computing safe security technology that […]
Why Secured2 is better than sharding
As described, sharding is a database technology that separates a database into chunks placed in different nodes to ‘speed up’ the access of data queries in a database. If you break into one node or container you can rebuild the entire dataset. Sharding is not a data security technology, sharding does not break data apart […]
Isn’t Secured2 like Data Sharding?
Many IT professionals we have met have confused Secured2 with a technology called ‘data sharding’. Sharding has been available for years and was introduced in the 90’s to facilitate horizontal scaling of a database. It breaks data into two or more chunks called logical shards. These shards get distributed across separated database nodes called physical […]
What makes Secured2 Quantum Safe?
While most post-quantum solutions are trying to solve the data security problem through advanced mathematical key systems, the Secured2 solution takes a different approach. We are focused on protecting the ‘data’ itself at the file level and solving the problem of factorization. If you can factor an encryption key, you gain access to the data. […]