Pages
- Applications
- AXEL Announces New York City Bar Association Partnership
- AXEL Announces Partnership with Phi Alpha Delta Law Fraternity to Become a Preferred Data Privacy and Security Solution for the Legal Industry
- AXEL Events
- AXEL Go Announces $10,000 Data Security Guarantee
- AXEL Go Blockchain App Joins Clio’s Global Platform of Legal Technology Solutions
- AXEL Network and Applications Terms of Use
- AXEL News Update
- AXEL Wallet User Agreement
- AXEL Websites Terms and Conditions
- AXEL.org
- AXEL® Brings Industry-leading Data Privacy and Security Capabilities to Theorem’s Innovative Legal Tech Marketplace with its Decentralized File-Sharing Application AXEL Go
- Blockchain
- Blog
- Careers
- Contact Us
- Digital Millennium Copyright Act (DMCA) Policy for AXEL Websites and Applications
- Guarantee Stipulations
- IPFS
- Masternode Operator Terms and Conditions
- Network
- Patents
- Press
- Privacy Policy for AXEL Websites and Applications
- Security
- Sitemap
- Team
- Team – Ben Ow
- Team – Daniel Lindsay
- Team – Diane Zhang
- Team – Dmytro Ashkinazi
- Team – Dr. Yoohwan Kim
- Team – Eugene Vandyuk
- Team – Jeff Roper
- Team – John Svoboda
- Team – Julianne Compann
- Team – Maxim Breev
- Team – Pavlo Ignatyev
- Team – Petro Hrynyuk
- Team – Rick Stiles
- Team – Roman Krushanovskyi
- Team – Rupesh Sudhakaran
- Team – Srikrishna Bharali
- Team – Tony Tan
- Team – Valentyn Pidburtnyi
- Team – Vitaliy Korotynskyy
- Team – Vitaliy Oskalenko
- Team – Vitaliy Yermolenko
- Team – Vladyslav Krasnyy
- Team – Yuriy Shchegelsky
- Technology
- AXEL Hosts Free Continuing Legal Education (CLE) Ethics Course for the Legal Industry
- AXEL is Pushing Toward the Future of Innovation: Receives Latest Patent for its Blockchain Technology
- One More Patent For a Web 3 Future: AXEL Receives Newest Patents for its Storage Technology
- AXEL Partners with National Non-profit Start Small Think Big to Provide Data Custody for Entrepreneurs
- AXEL Releases Secure Fetch
- AXEL Token Now Traded on WhiteBIT Exchange
- AXEL Becomes a Data Privacy Champion
- AXEL Named as a Top 10 Masternode Project Heading into 2020
- AXEL Selected as a Deep Tech Pioneer by Hello Tomorrow
Posts by category
- Category: Announcements
- Category: blockchain
- Category: Business
- Biggest Hacks of 2022 (Part 2)
- Biggest Hacks of 2022 (Part 1)
- The State of Government Cybersecurity 2022
- Privacy for the Future
- File Sharing 101: How to Easily Share Large Files
- Web3 Beyond Crypto
- Your Privacy and The Internet of Things
- Personal Vehicle Telematics and Privacy Oversights
- Why IPFS is the Future of Internet Storage Systems
- Protecting the workplace from Day 1 Exploits
- How User Experience Impacts Cyber Security
- Protecting your Privacy With End-to-End Encryption
- Devastating Hospital Hacks
- The Dangers of Leftover Attachments
- How Secure Are Your Apps, really?
- ABA GPsolo Roundtable Roundup
- Our Continued Loss of Privacy
- Casting a Shadow of Protection
- Why Digital Sharding is the Future of File Storage
- The Practical Applications of Web3
- Archival With the Future in Mind
- IPFS: Securing Our Privacy Future
- Five Simple Security Tricks
- IPFS: The InterPlanetary Solution to Small Business Problems
- Schools: Our Cybersecurity Blindspot
- The State of Privacy Laws in 2022
- The Great Return (Back to the Office)
- Artificial Intelligence is Here to Stay. How Will That Affect Businesses, Individuals, and Our Privacy?
- Big Tech is Talking Privacy. What Does That Mean for the Future of Our Data?
- How Technology Changed Business (And What That Means for the Future of the Industry)
- Small Business Tech Trends of 2022
- After the Cyberattack: What Happens to your Data Following a Breach?
- AXEL’s Guide to Remote Work
- 2021 Cybersecurity Year in Review
- INTERVIEW: How COVID Changed the Courtroom (and the Future of Law)
- Enron, Ethics, and the Fight for Privacy
- Self-Driving Cars are Here. Are Businesses, Consumers, and Lawyers Ready?
- Cybersecurity Strategies for Small Businesses and Firms
- Is Virtual Reality the Future? Facebook Thinks So.
- Devastating Data Breaches – Part 5: Facebook Dismisses Data Security
- Devastating Data Breaches – Part 4: How Target Changed Credit Cards
- Devastating Data Breaches – Part 3: The Negligence of Equifax
- Devastating Data Breaches – Part 2: Marriott’s Merger Misfire
- Devastating Data Breaches – Part 1: The Hard Fall of Yahoo
- Everywhere is the New Office: The Rise of Digital Nomads
- Convenient or Monopolistic? Epic’s Challenge to Apple’s “Walled Garden”
- Big Tech’s Big Secret: Why Google and Apple Want Your Data
- Bitcoin has Entered the Mainstream. Now What?
- Data Breaches are Here to Stay (For the Unprepared)
- What the New Infrastructure Bill Means for Tech
- For Here or To Go? Remote Work, Hybrid Offices and the Future of the Workplace
- Why the Data Localization Movement is Misguided
- Here’s Why Free Software Can Be a Poison Pill
- Centralization kills the internet star
- How Amazon Is Using Your Data To Make You Buy
- Category: Company News
- Category: crypto
- Category: Culture
- Has School Surveillance Gone Too Far?
- What Does Cyberwarfare Look Like? Just Ask Ukraine.
- National Technology Day: How Tech has Changed the Way We Live
- Law Enforcement is Already Breaking into Encrypted Devices
- Sharing user data with Facebook? WhatsApp with that?
- The 10 WORST Data Breaches of the Decade
- Why Data Breaches are so Damaging and how the Law has Failed Consumers
- Category: Cybersecurity
- What Do We Do About Social Engineering?
- National Data Privacy Day: The Internet isn’t Anonymous Anymore
- How Law Firms Should Handle Cybercrime
- The World’s Top Hacking Groups – Part 2
- The World’s Top Hacking Groups – Part 1
- The History and Modern Uses of Encryption
- Data Privacy and Security Increase Profitability in the Cannabis Industry
- Another Day, Another Cyberattack: Kaseya Software and the Future of Ransomware
- Breaking Down Biden’s Executive Order on Cybersecurity
- The Jones Day Law Firm Data Breach Serves as a Warning for Others
- Ransom-Wars: The Task Force Awakens
- What Else We’ve Learned About the SolarWinds Data Breach
- The Ethical Responsibility for Data Security in Finance, Law, and Healthcare
- The Microsoft Exchange Hack is Unparalleled
- Have We Entered the Age of Cyber Terrorism?
- The Empire Strikes Back Against Ransomware
- The SolarWinds Beneath Hackers’ Wings
- China Hacks the Planet – Part I
- Iran’s State-Sponsored Hackers Continue to Wage Cyber War
- A Look into North Korea’s Legion of Cyber Criminals
- Ransomware is Big Business for REvil Hacker Group
- Cyber Monday Attracts Cybercriminals
- Phishing: Not as Relaxing as it Sounds
- Ransomware: Give us back our files!
- Think Twice Before Using Email Attachments
- Hackers Enjoy Open Season for Data
- The Effect of COVID-19 on Data Breaches
- Recent Hacks Against Twitter, CWT, and Garmin
- How Artificial Intelligence is Shaping the Future of Cybersecurity
- How To Stay Safe Online When You’re Traveling
- How To Sound Like A Cybersecurity Expert
- How To Shop Safely On Black Friday And Cyber Monday
- Do Your Apps Know Too Much About You?
- A Beginner’s Guide to Staying Safe Online
- The Growth of Privacy – VPNs and Beyond
- Read This Before Downloading That New App
- The Hidden Danger of Virtual Worlds
- 6 textbook examples of how NOT to respond to a Data Breach (Seriously guys?)
- Why Your Camera Isn’t As Safe As You Think
- Protect Data Privacy by NOT Collecting Data at All
- California Thinks It’s Fixing Data Privacy. It’s Not.
- How Virtual Reality Is Being Used To Put An End To Cyber Attacks
- Good Idea / Bad Idea: Protecting Yourself Online Edition
- Facial Recognition Technology and What It Means for Data Privacy and Protection
- Looking Ahead: You Own Your Vehicle, But Who Owns Your Vehicle-Generated Data?
- We’re Wearing Our Data – What Wearables and the Internet of Things Mean for Data Privacy
- How The Government Just Killed Your Online Privacy
- You Don’t Own Your Data… Here’s Who Does
- Category: Front Page Blogs
- Category: Health
- Category: Industry Related
- Category: Legal
- Category: Lifestyle
- Category: Privacy
- Category: Professional
- Category: Startups
- Projects We Love: PrivacyWall
- This New Startup Helps Non-Techies Use Machine Learning
- How This Machine Learning App Will Help You Become the Next Picasso
- The AI-Based Startup That Knows Your Skin Better Than You Do
- A Team Communication App That’s the First of Its Kind
- You’ll Never Want to Stop Traveling After Learning About This Startup
- Category: Tech
- Shady Schemes and Sinful Scams: The History of Internet Spam
- Digital Assistants are Invading your Privacy
- How to Rebuild Trust in Tech
- Encryption: The Past, Present, and Future
- Is High-Speed Fiber Coming to a Farm Near You?
- 5G Networks Pose New Security Problems
- The Distributed Future
- The 21st Century Bid to Become Immortal
- Quantum Computing Will Change Cybersecurity – If We Can Figure Out What It Is
- Why Free Will Cost You a Fortune
- The Future of Digital Storage
- Category: Tech Tips
- Category: Trends
- Category: Uncategorized