Peter Wayner

Contributing writer

Peter Wayner is the author of more than 16 books on diverse topics, including open source software ("Free for All"), autonomous cars ("Future Ride"), privacy-enhanced computation ("Translucent Databases"), digital transactions ("Digital Cash"), and steganography ("Disappearing Cryptography").

NIST names new post-quantum cryptography standards

How chaos engineering can help DevSecOps teams find vulnerabilities

How chaos engineering can help DevSecOps teams find vulnerabilities

DevOps teams have used chaos engineering concepts to find software bugs for years. Tools are now available to help identify security flaws, too.

12 database security landmines, failures, and mistakes that doom your data

12 database security landmines, failures, and mistakes that doom your data

Lapses in protecting databases are common and attackers know it. Here are the top database weaknesses they try to exploit.

Secure multiparty computation explained: Ensuring trust in untrustworthy environments

Secure multiparty computation explained: Ensuring trust in untrustworthy environments

Secure multiparty computation is a collection of algorithms that allow people to work together over a network to find a consensus or compute a value and have faith that the answer is correct. Everyone contributed fairly and there was...

11 technologies improving database security

11 technologies improving database security

The database does not have to be a security and privacy liability. These technologies can reduce risk and help ensure regulatory compliance.

What's next for encryption if the RSA algorithm is broken?

What's next for encryption if the RSA algorithm is broken?

A recent, yet to be proven paper claiming to have found a way to "destroy the RSA cryptosystem" has cryptographers asking what might replace it.

16 technology winners and losers, post-COVID

16 technology winners and losers, post-COVID

The coronavirus crisis has shaken up business as usual, with some IT strategies and tools rising to the occasion and others in line for a rethink or tough recovery post-pandemic.

Inrupt offers a standard for controlling data and identity on the web

Inrupt offers a standard for controlling data and identity on the web

Founded by security and web luminaries, Inrupt has commercialized the Solid Project technology to manage sensitive data in a more secure, compliant manner...if enough people buy into its vision.

6 top security technologies to protect remote workers

6 top security technologies to protect remote workers

Zero trust, SASE, and identity management are just some of the technologies companies are deploying to secure home-based workers, systems, and data.

Differential privacy: Pros and cons of enterprise use cases

Differential privacy: Pros and cons of enterprise use cases

Hiding sensitive data in a sea of noise might have more value than encryption in some use cases. Here are the most likely differential privacy applications and their trade-offs.

4 hot areas for encryption innovation

4 hot areas for encryption innovation

Researchers are making progress on a variety of approaches to strengthen encryption techniques and algorithms. Here are some of the hottest areas in cryptographic research.

11 reasons encryption is (almost) dead

Massive leaps in computing power, hidden layers, hardware backdoors -- encrypting sensitive data from prying eyes is more precarious than ever

Load More