Can PKI provide better encryption methodology compared to password-based authentication?

“Complexity is the worst enemy of security.” When Bruce Schneier said this about 20 years ago, where still at a nascent stage as compared to cyber threats today. Cyber attackers are known to use equally complicated methodologies to find security loopholes in information systems and their methods seem to be evolving.  The number of breaches and hacks …

Blockchain and IoT – How they work together

Blockchain became popular as the engine driving bitcoin and other virtual currencies; however, it seems to be more than this, especially when it comes to the potential of blockchain to transform and to modernize the global economy. In many ways, blockchain and IoT are a perfect pair. Blockchain is currently securing the most valuable cryptocurrencies …