Did you know that....
Cryptographic keys stored in software are not hard to find?
On average, a hacker has 160 days before they are detected in your network?
Modern encryption solutions cannot be decrypted through deciphering techniques?
View this webinar as we discuss why it's important to protect the crypto...
Implementing a "zero trust" architecture for the remote workforce during the COVID-19 pandemic requires secure authentication methods, role-based access strategy and encryption standards based on micro-segmentation, according to a panel of security experts.
Zoom will begin beta testing an end-to-end encryption feature in July that it plans to make available at no charge to all who use the paid or free version of its teleconference platform. It's also rolling out other new security features.
Increasingly, organizations are turning to encryption to help solve multiple security issues, whether it's protecting data, managing risk or meeting government regulations. While managing all these encryption keys can be complex, Brad Beutlich of nCiper Security doesn't believe it has to be this way.
As digital transformation technologies such as containers and connected devices are changing business models, organizations are finding new ways to secure data with encryption. John Grimm of nCipher Security walks through how the use cases for encryption are keeping up with the times.
Ransomware gangs keep innovating: Maze has begun leaking data on behalf of both Lockbit and RagnarLocker, while REvil has started auctioning data - from victims who don't meet its ransom demands - to the highest bidder. Thankfully, security experts continue to release free decryptors for some strains.
This white paper starts with a look back at the evolution of encryption and key management systems. The challenges for IT teams around
encryption systems are then examined, including regulation and compliance, complexity, lack of proper management tools, and ensuring
availability and scalability. This is followed by...
This white paper is intended to aid in forming a cloud security strategy and data migration plan when adopting public cloud services.
You will discover solutions that offer mature recommendations for adopting public cloud services. This brings together actionable advice recommendations across disciplines and customer...
Mphasis, the IT service management company, has made many adjustments to its risk management strategy - including wider use of multifactor authentication - as a result of more staff members working from home, says Sethu S. Raman, senior vice president and chief risk officer.
Zoom has reached a settlement with the New York state attorney general's office to provide better security and privacy controls for its videoconferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company.
With $30 million in funding, Silicon Valley icons Jim Clark and Tom (TJ) Jermoluk launched Beyond Identity, a new identity management platform that promises "the end of passwords." Jermoluk discusses the technology and how this is a continuation of what he and Clark started 25 years ago.
TikTok, a video-sharing service, has been delivering video and other media without TLS/SSL encryption, which means it may be possible for someone to tamper with content, researchers say. That could be especially damaging in the current pandemic environment, where misinformation and confusion abounds.
Zoom, responding to research that highlighted encryption and infrastructure shortcomings in its audio and video conferencing software, has promised to further revamp its security controls. With COVID-19 driving a surge in working from home, researchers have been closely reviewing the security of such software.