Peter Wayner

Contributing Editor

Peter Wayner is contributing editor at InfoWorld and the author of more than 16 books on diverse topics, including open source software ("Free for All"), autonomous cars ("Future Ride"), privacy-enhanced computation ("Translucent Databases"), digital transactions ("Digital Cash"), and steganography ("Disappearing Cryptography"). His work regularly appears in InfoWorld, and he consults on software projects big and small. The second edition of his book on robot cars, "Future Ride," is out now. Disclosure: He also writes for Hewlett-Packard's TechBeacon marketing website.

16 technology winners and losers, post-COVID

Inrupt offers a standard for controlling data and identity on the web

Inrupt offers a standard for controlling data and identity on the web

Founded by security and web luminaries, Inrupt has commercialized the Solid Project technology to manage sensitive data in a more secure, compliant manner...if enough people buy into its vision.

6 top security technologies to protect remote workers

6 top security technologies to protect remote workers

Zero trust, SASE, and identity management are just some of the technologies companies are deploying to secure home-based workers, systems, and data.

Differential privacy: Pros and cons of enterprise use cases

Differential privacy: Pros and cons of enterprise use cases

Hiding sensitive data in a sea of noise might have more value than encryption in some use cases. Here are the most likely differential privacy applications and their trade-offs.

4 hot areas for encryption innovation

4 hot areas for encryption innovation

Researchers are making progress on a variety of approaches to strengthen encryption techniques and algorithms. Here are some of the hottest areas in cryptographic research.

11 reasons encryption is (almost) dead

Massive leaps in computing power, hidden layers, hardware backdoors -- encrypting sensitive data from prying eyes is more precarious than ever

Security through obscurity: How to cover your tracks online

Security through obscurity: How to cover your tracks online

From Tor to steganography, these six techniques will help obscure the data and traces you leave online

12 Programming Mistakes to Avoid

The dirty dozen of application development pitfalls -- and how to avoid these all-too-common programming blunders

Load More