tera insights blog
tiCrypt Add-on Releases
We at Tera Insights have recently released two add-ons designed to work with and enhance tiCrypt to fit specific needs. Take a look at these exciting new features and some soft demos!
READ POST
Elliptic Curve Cryptography
The Revolutionary method of Encryption and Communication
READ POST
tiCrypt Deploys at University of Florida
Together with the University of Florida, Tera Insights has developed tiCrypt, a complete end-to-end encryption framework to securely manage and share files with users and groups, and process data using Virtual Machines. tiCrypt is currently HIPAA and FISMA-low compliant.
READ POST
Perimeter defense doesn't cut it anymore.
Perimeter defense is flawed in nature. Much like a conventional stone, brick or steel walls, perimeter defense systems will always have a way over, under, around or through that can be exploited.No matter how big and tall, thick and wide, or flashy and expensive, the perimeter defense is going to be breached. As stated in the name, perimeter defense is meant to serve as the first line of defense, not as the singular layer of security.
READ POST
We Moved!
Tera Insights has recently moved to a private office minutes from the University of Florida.
READ POST