Data-in-use encryption is considered by many as the next generation of encryption. It takes a new approach that ensures sensitive data is never left unsecured, regardless of lifecycle stage (at rest, in transit, or in use) source, or location (on premise, cloud, or hybrid).
Download this tech brief to learn the 6...
In a multinational effort led by the Dutch National Police, authorities seized servers and web domains used by DoubleVPN, a Russia-based company that allegedly provided a safe operating infrastructure for cybercriminals, according to Europol.
Security specialists are offering preliminary feedback on Microsoft's sneak peek at the new security measures to be included in the Windows 11 operating system, which is slated for release in December.
For most organizations, the rationale for employing data security solutions is crisis mitigation associated with potential data breaches - driven by compliance regulations, possible fines and reputation loss. There is, however, another compelling rationale for strong data security program that a growing number of...
The ongoing pandemic has driven massive changes in business operations, including increased remote work and accelerated cloud transformation. But while those have enabled organizations to be more agile, they also pose multiple compliance and operational challenges, says Todd Moore, vice president of encryption...
To unlock the value of quantum computing, two systemic risks - tech governance and cybersecurity - need to be overcome, says William Dixon of the World Economic Forum.
What do the world's leading encryption and security experts think about non-fungible tokens, supply chain attacks, coordinated vulnerability disclosure and the state of quantum computing? The cryptographers' panel at RSA Conference 2021 addressed all these issues.
The ongoing pandemic has driven massive changes in business operations, including increased remote work and accelerated cloud transformation. But while those have enabled organizations to be more agile, they also pose multiple compliance and operational challenges, says Todd Moore, vice president of encryption...
Organisations in Australia have expanded their use of encryption to protect cloud and on-premises data and applications, but what challenges are they facing? And what tools do they find most effective?
The 2021 Australia Encryption Trends Study, conducted by the Ponemon Institute and sponsored by Entrust, will be...
Can courts trust evidence collected by Cellebrite's mobile device forensic tools? Matt Bergin of KoreLogic has found new vulnerabilities in Cellebrite's software that he will present on Friday at Black Hat Asia. He says that forensics software should be put through rigorous penetration tests.
Law enforcement agencies use forensics tools from Israeli company Cellebrite to gain access to locked mobile devices and extract data. But the creator of encrypted messaging app Signal says he's found vulnerabilities in Cellebrite's tools, raising questions about whether the extracted data can be trusted.
New encryption standards TLS 1.3 and DNS-over-HTTPS (DoH) will soon sweep away security controls. Security professionals must act within the next two years or they won't be able to analyze network traffic and detect cyberthreats.
Download the Forrester report —Maintain Security Visibility in the TLS 1.3 Era —...
The 2021 Global Encryption Trends Study, the most comprehensive encryption survey in the industry, highlights how organizations are managing encryption strategies and data security threats across multiple clouds. The results are clear: sensitive data is still at risk and more scattered than ever.
Coverage...
Encryption leaves gaping holes in data protection - by protecting data at rest and in motion, but not in use. Tokenization safeguards data at the cost of usability and performance.
Download this white paper and learn how your organization can:
More easily access data and ensure its protection;
Ensure data is both...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.