Blogs & Media

Xiph Cyber brings you the latest industry news and views.

Every day a new threat is manufactured, and every day an innovative counter to that threat is created. Our industry moves quickly, and those that can't or won't keep up are fast left behind in high-risk territory.

At Xiph Cyber, our commitment to protecting your privacy and the sovereignty of your data means we invest a lot of time and effort in maintaining up-to-the-minute awareness of the shifts in our industry. You'll find the latest news and our own blogs right here.

Browse categories: Case Studies , Security

Why you should use alternative search engines

Jul 15, 2022

Search engines are a necessity to access information in today’s world, although most of them serve as data collection tools for advertising companies. Big search engines like Google, Yahoo! and the whole cahoots collect far more data and information about you than you might realise. They even censor search results based on dubious filtering and sometimes outright manipulation. If you’re looking for alternative search engines that can give you unbiased search results and respect your privacy, ...

How social media is tracking you & collecting your data

Jul 09, 2022

Ever wondered exactly how Facebook gives you suggestions for products you like and people you may know? If you have a Facebook account—and even if you don't—the platform collects tons of data about you. The same goes for Instagram, Twitter, Google, and pretty much all other platforms and networks you interact with. We explain how and why below.

SSD vs HDD: Which is better?

Jul 05, 2022

When choosing the right type of storage for your computer, it’s important to not only consider capacity and cost, but also performance, power usage, and reliability. The choice will often be between a solid-state drive (SSD) or a hard disk drive (HDD) as the two main storage solutions for laptops and computers. Here’s a quick guide comparing both storage drives.

Is the Metaverse safe?

Jun 28, 2022

Ever since Facebook rebranded itself as Meta and Mark Zuckerberg presented the idea of the ‘Metaverse’ as the ‘successor to mobile internet’, it has suddenly become a major trending topic. So, what exactly is it? What opportunities does it represent for businesses and what are the main cyber security concerns?

Is crypto dead?

Jun 23, 2022

The recent crypto crash has seen the value of most major cryptocurrencies plunge to an 18-month low, with the combined market value of all cryptocurrencies now reportedly less than $US1 trillion ($1.43 trillion). The increasing day-to-day volatility of digital currencies, rising inflation globally, and recent stock market fluctuations have led to speculations we could be heading for our longest crypto winter to date. So, is crypto dead or just bearing down for a comeback? 

What is encryption & how does it protect your data?

Jun 17, 2022

Everyone uses encryption technology on a daily basis, whether that’s when surfing the interning, storing data in the cloud, or working for a business that processes tons of private data. While most of us probably don't understand the ‘how’ or ‘why’ − encryption is vital to keeping sensitive information private and out of the hands of unscrupulous actors. This guide explains what encryption is and how it works.

HTTP vs HTTPS: Which is more secure?

Jun 10, 2022

The world of website security abounds with obscure acronyms, and none are more misunderstood than internet protocols like HTTP and HTTPS. While both allow communications between web browsers and web servers, it’s important to understand the basics of how they work and what their differences are.

What is cloud storage & is it safe?

Jun 03, 2022

Chances are you’ve used ‘the cloud’ before – when you’ve been on Instagram, YouTube, or even Gmail − (yes, they all use cloud computing). Although the majority of internet users and businesses use storage space on the internet, cloud storage and how it works is still a mystery for many. Fret not, we cover all the fast facts in this guide.s and photos in the cloud, while businesses use cloud storage for data backup, disaster recovery, archiving, and DevOps projects.

How to stop your phone from listening & tracking you

May 27, 2022

Have you ever been served ads for a product you mentioned in a recent conversation? Like the time you said you’d like to try yoga and were immediately bombarded with pages for yoga mats. Or perhaps you’ve discussed your need for a weekend away and then suddenly got suggestions for hotels and restaurants nearby? Is it a coincidence, or is your phone listening to you? Here’s the lowdown.

Open-source vs proprietary software: Which is better?

May 20, 2022

Whether your business is migrating to a new operating system, design software, or customer relationship management (CRM) platform, you may at some point be faced with choosing between an open-source or proprietary software infrastructure. Both come with benefits and disadvantages for businesses. We cover everything you need to know below.

Free resources

When you need more information on industry changes and developments, click on our Free Resources