encryption enterprise encryption

Enterprise Data Encryption Use Reaches Historic Highs

For decades, enterprise data encryption and effective key management were something most enterprises wanted to do but couldn’t — if they tried to do it at all. Only the largest of enterprises ...
Security Boulevard

Signal Adds Cryptocurrency Support

According to Wired, Signal is adding support for the cryptocurrency MobileCoin, “a form of digital cash designed to work efficiently on mobile devices while protecting users’ privacy and even their anonymity.” Moxie ...

Zero Trust for Data

Encryption has been around for a long time. It is the holy grail in data security because data encryption translates data into another form, or code, so that only people with access ...
Encryption Backdoor Debate, Microsoft Exchange Attacks, Airline Supplier Data Breach

Encryption Backdoor Debate, Microsoft Exchange Attacks, Airline Supplier Data Breach

Why is federal law enforcement (still) asking Congress for encryption backdoors? Attacks on Microsoft Exchange servers seem to have gotten worse, details on an airline supplier data breach, and the real reason ...
Criminals arrested after trusting encrypted chat app cracked by police

Criminals arrested after trusting encrypted chat app cracked by police

Police in the Netherlands and Belgium have made hundreds of raids, and arrested at least 80 people, after cracking into an encrypted phone network used by organised criminals. In a press release, ...
cybersecurity CSRB cyberresilience Information security architecture

Four Steps to Protect Strategic Information

The COVID-19 pandemic has shifted the spotlight back on security issues that organizations have struggled with for years. Workers are connecting to corporate networks from more devices than ever before – but ...
Security Boulevard
Usage Scenarios for Externalized Trust

Usage Scenarios for Externalized Trust

As we discussed in “The Cloud trust paradox: To trust cloud computing more, you need the ability to trust it less”, there are situations where the encryption key really does belong off ...
Fighting Financial Fraud with Consilient and Intel SGX

Fighting Financial Fraud with Consilient and Intel SGX

Intel is a sponsor of TechSpective When it comes down to it, money is involved in virtually every form of crime and cybercrime. In many cases, money itself is the primary target, ...
CIA

Second Swiss Firm Said to Be CIA Encryption Puppet

First Crypto AG, and now Omnisec AG: Sources say second Swiss company was also in the pocket of the CIA ...
Security Boulevard
quantum computing, AI, DigiCert encryption,QKD quantum

Why It’s Time to Quantum-Proof Your Communications Infrastructure

It’s a matter of time until the day arrives when quantum computers will crack traditional encryption. This moment, often referred to as “Y2Q,” may be as little as three to five years ...
Security Boulevard

Secure Guardrails