CIA

Second Swiss Firm Said to Be CIA Encryption Puppet

First Crypto AG, and now Omnisec AG: Sources say second Swiss company was also in the pocket of the CIA ...
Security Boulevard
quantum

Why It’s Time to Quantum-Proof Your Communications Infrastructure

It’s a matter of time until the day arrives when quantum computers will crack traditional encryption. This moment, often referred to as “Y2Q,” may be as little as three to five years ...
Security Boulevard

Indistinguishability Obfuscation

Quanta magazine recently published a breathless article on indistinguishability obfuscation — calling it the “‘crown jewel’ of cryptography” — and saying that it had finally been achieved, based on a recently published ...

Innovative Encryption Solutions to Help Prevent Side Channel Attacks

Encryption is an essential element of effective cybersecurity and data protection. Only systems or individuals with the correct encryption keys are able to decipher and view the encrypted data. Of course, attackers ...
Small, fast and easy. Pick any three.

Small, fast and easy. Pick any three.

By Seth Hall, Co-Founder & Chief Evangelist, Corelight Zeek has been the darling of security defenders looking to get deep visibility into network traffic. Over the last two decades, Zeek has become ...
Check, Please! Adding up the Costs of a Financial Data Breach

Check, Please! Adding up the Costs of a Financial Data Breach

Guest article by Andrea Babbs, UK General Manager at VIPREReliance on email as a fundamental function of business communication has been in place for some time. But as remote working has become ...

New Report on Police Decryption Capabilities

There is a new report on police decryption capabilities: specifically, mobile device forensic tools (MDFTs). Short summary: it’s not just the FBI that can do it. This report documents the widespread adoption ...

TrickBot Takedown, VPN Flaws, Zoom End-to-End Encryption

In episode 143 for October 19th 2020: Microsoft gets creative to help take down the TrickBot botnet, details on how attackers have been using VPN flaws to attack election support systems, and ...
data encryption

Encryption Requirements Driven by Data State

Have you ever had that feeling that something is amiss? While conducting research on when data encryption is required, I noticed something that seemed a little off. It is commonplace for regulations ...
Security Boulevard
How To Protect Against SSL/TLS Flood Attacks Without Decryption Keys

SSL: Protective Technology Turned Attack Vector

SSL is increasingly being used to mask and further complicate attack traffic detection in both network and application level threats. The post SSL: Protective Technology Turned Attack Vector appeared first on Radware ...