A scientist claims to have developed an inexpensive system for using quantum computing to crack RSA, which is the world's most commonly used public key algorithm. If true, this would be a breakthrough that comes years before experts predicted. Now, they're asking for proof.
A machine identity management provider led by an ex-Tricentis executive notched a $1.3 billion valuation after getting a minority investment from Sixth Street Group. Keyfactor said the funds will support high market demand for technology that secures devices and simplifies public key infrastructure.
The best way to level-up your existing IAM infrastructure is to add a single sign-on (SSO) to protect logins for approved apps. This guide will show you the benefits of a combined approach, in which company-approved and non-approved logins are attached to a single, strongly vetted identity to simplify administration,...
Year after year, the rise in large-scale data breaches is faster and steeper. Not only is your business at risk, but so are your customers – as we keep learning, the hard way.
As we adjusted to the pandemic, cybersecurity trended – quite unfortunately – in the wrong direction. While our work lives merged with...
Password security is a critical start for protecting devices and networks from malicious threats. However, implementing successful password security can be easier said than done. Do you have employees who are worried they won't remember something more complex than "password123"? Are you looking for 7 actionable steps...
Protecting your data from breaches is only one aspect of enterprise security, but it's important to go further to ensure that your secrets will remain safe – even in the unlikely event of a breach. Your information shouldn't just be protected by an account password, but also by a unique Secret Key: a 128-bit,...
The head of a key European Parliament committee said he's concerned about media reports suggesting that a proposal mandating that instant messenger apps scan for CSAM was crafted under the influence of an American tech foundation and a nonprofit with ties the British and U.S. government.
A day after the British Parliament approved a bill intended to eradicate child abuse content, cabinet officials called on social media giant Meta to halt a rollout of end-to-end encryption. Meta hasn't provided assurances that it will safeguard users, charged Home Secretary Suella Braverman.
Chinese hackers were able to access the email accounts of senior U.S. officials after Microsoft included an active digital signing key in a snapshot of data taken to analyze a crash of its consumer signing system in April 2021. Inclusion of the key in the crash dump was just one of many mishaps.
For banking and financial organizations, protecting sensitive customer data and meeting compliance requirements for regulations is critical. Balancing those requirements with the speed of business and demands of modern banking can be a challenge.
As you update your cybersecurity plans and data breach prevention...
Security researchers uncovered multiple vulnerabilities in a widely used radio communication system used by law enforcement and in critical infrastructure for data transmission that could allow remote decryption of cryptographically protected communications.
As cloud services are on the rise with ever-growing workloads and more and more secrets being created by the R&D teams, the number and variety of secrets per organization are exploding. Needless to say, Secrets management and monitoring are crucial components of any security program.
This webinar will explore the...
A European Commission effort to require instant messenger apps such as WhatsApp and iMessage to scan for child sexual abuse material would likely violate Europeans' human rights and weaken encryption protections for consumers, a leaked document from the commission's internal legal service says.
Quantum computers and chatbots, as well as hype around blockchain, were topics discussed during The Cryptographers' Panel at RSA Conference 2023. For anyone who needs to keep data secure for more than 30 years, advice from panelist Adi Shamir was simple: Don't rely on public key cryptography.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.