encryption

Second Swiss Firm Said to Be CIA Encryption Puppet

First Crypto AG, and now Omnisec AG: Sources say second Swiss company was also in the pocket of the CIA.

6 days ago

Why It’s Time to Quantum-Proof Your Communications Infrastructure

It’s a matter of time until the day arrives when quantum computers will crack traditional encryption. This moment, often referred…

6 days ago

Indistinguishability Obfuscation

Quanta magazine recently published a breathless article on indistinguishability obfuscation — calling it the “‘crown jewel’ of cryptography” — and…

2 weeks ago

Innovative Encryption Solutions to Help Prevent Side Channel Attacks

Encryption is an essential element of effective cybersecurity and data protection. Only systems or individuals with the correct encryption keys…

3 weeks ago

Small, fast and easy. Pick any three.

By Seth Hall, Co-Founder & Chief Evangelist, Corelight Zeek has been the darling of security defenders looking to get deep…

3 weeks ago

Check, Please! Adding up the Costs of a Financial Data Breach

Guest article by Andrea Babbs, UK General Manager at VIPREReliance on email as a fundamental function of business communication has…

3 weeks ago

New Report on Police Decryption Capabilities

There is a new report on police decryption capabilities: specifically, mobile device forensic tools (MDFTs). Short summary: it’s not just…

1 month ago

TrickBot Takedown, VPN Flaws, Zoom End-to-End Encryption

In episode 143 for October 19th 2020: Microsoft gets creative to help take down the TrickBot botnet, details on how…

2 months ago

Encryption Requirements Driven by Data State

Have you ever had that feeling that something is amiss? While conducting research on when data encryption is required, I…

3 months ago

SSL: Protective Technology Turned Attack Vector

SSL is increasingly being used to mask and further complicate attack traffic detection in both network and application level threats.…

4 months ago