Now That’s Cryptographic Computing Power

It was recently discovered that more than one business were surreptitiously using computing power of visitors to their web sites to mine bitcoins. Maybe they did this as an alternative way of paying for their costs instead of using advertising. Maybe they did this for other reasons. But this should not be too surprising. The The post Now That’s Cryptographic Computing Power appeared first on Voltage.
Read more

GDPR compliance in legacy environments

The General Data Protection Regulation (GDPR) that takes effect next May will require businesses to protect the privacy of any personal data that they manage. There are many ways to do this, but the GDPR strongly encourages the use of pseudonymization, which, depending on how the business currently manages the personal data it acquires, may or may The post GDPR compliance in legacy environments appeared first on Voltage.
Read more

Are you accidentally paying for BitCoins?

It was recently discovered that more than one business were surreptitiously using computing power of visitors to their web sites to mine bitcoins. Maybe they did this as an alternative way of paying for their costs instead of using advertising. Maybe they did this for other reasons. But this should not be too surprising. The The post Are you accidentally paying for BitCoins? appeared first on Voltage.
Read more

Definitions Matter when talking about Blockchain

There is lots of talk of bitcoin and blockchain in the news these days. It’s clear what bitcoin is, but the precise definition of a blockchain is more than a bit more elusive. Definitions matter. In thermodynamics, you have a reasonable definition for temperature. But with that definition, it turns out that lasers have a The post Definitions Matter when talking about Blockchain appeared first on Voltage.
Read more

The Real Value of Bitcoin

The recent dramatic increase in the price of Bitcoin has encouraged lots of people to give us their estimates for what the price of Bitcoin really ought to be. These vary by so much that it’s almost worth treating them like engineers handle values that can vary by many orders of magnitude. The common way The post The Real Value of Bitcoin appeared first on Voltage.
Read more

The State of PCI Compliance, 2017

Complying with the Payment Card Industry Data Security Standard (PCI DSS) can be hard. Businesses have been working on doing so for over 13 years, since PCI DSS Version 1.0 was released on December 15, 2004. In fact, it’s so hard that a significant fraction of businesses are still not in full compliance. According to The post The State of PCI Compliance, 2017 appeared first on Voltage.
Read more

The High/low Entropy Rant for Cryptography

We had another discussion of entropy today.  In computing, entropy is the randomness collected by an operating system or application for use in cryptography or other uses that require random data, a quick search of Wikipedia will tell you.  And you may well know, a lack of entropy can have a negative impact on performance The post The High/low Entropy Rant for Cryptography appeared first on HPE Security - Data Security.
Read more

Quantum computers breaking encryption? Don’t panic!

If clever engineers somehow figure out how to build large-scale quantum computers, it would make some, but not all, known public-key encryption algorithms essentially useless. But there are already public-key encryption algorithms that are known, even ones that have been through reputable standards processes, that will still be secure if this happens. Underlying all public-key The post Quantum computers breaking encryption? Don’t panic! appeared first on HPE Security - Data Security.
Read more

Blockchain Versus the GDPR

The EU’s General Data Protection Regulation (GDPR) takes effect on May 25, 2018. It will require all businesses that process EU citizens’ personal data to take lots of measures to protect their privacy. The GDPR also provides EU citizens with a right to erasure: to be able to require that businesses holding their data irrevocably The post Blockchain Versus the GDPR appeared first on HPE Security - Data Security.
Read more

Quantum Computing? Really?

We just had an interesting discussion here about quantum computing, quantum cryptography and post-quantum cryptographic algorithms. I’m afraid that I might have wasted a few people’s time with a rant about why I’m not impressed by the possibilities for quantum computing. I started by noting my thoughts on how hard it is going to be The post Quantum Computing? Really? appeared first on HPE Security - Data Security.
Read more
Page 1 of 212