

Peter Wayner
Contributing writer
Peter Wayner is the author of more than 16 books on diverse topics, including open source software ("Free for All"), autonomous cars ("Future Ride"), privacy-enhanced computation ("Translucent Databases"), digital transactions ("Digital Cash"), and steganography ("Disappearing Cryptography").

How chaos engineering can help DevSecOps teams find vulnerabilities
DevOps teams have used chaos engineering concepts to find software bugs for years. Tools are now available to help identify security flaws, too.

12 database security landmines, failures, and mistakes that doom your data
Lapses in protecting databases are common and attackers know it. Here are the top database weaknesses they try to exploit.

Secure multiparty computation explained: Ensuring trust in untrustworthy environments
Secure multiparty computation is a collection of algorithms that allow people to work together over a network to find a consensus or compute a value and have faith that the answer is correct. Everyone contributed fairly and there was...

11 technologies improving database security
The database does not have to be a security and privacy liability. These technologies can reduce risk and help ensure regulatory compliance.

What's next for encryption if the RSA algorithm is broken?
A recent, yet to be proven paper claiming to have found a way to "destroy the RSA cryptosystem" has cryptographers asking what might replace it.

16 technology winners and losers, post-COVID
The coronavirus crisis has shaken up business as usual, with some IT strategies and tools rising to the occasion and others in line for a rethink or tough recovery post-pandemic.

Inrupt offers a standard for controlling data and identity on the web
Founded by security and web luminaries, Inrupt has commercialized the Solid Project technology to manage sensitive data in a more secure, compliant manner...if enough people buy into its vision.

6 top security technologies to protect remote workers
Zero trust, SASE, and identity management are just some of the technologies companies are deploying to secure home-based workers, systems, and data.

Differential privacy: Pros and cons of enterprise use cases
Hiding sensitive data in a sea of noise might have more value than encryption in some use cases. Here are the most likely differential privacy applications and their trade-offs.

4 hot areas for encryption innovation
Researchers are making progress on a variety of approaches to strengthen encryption techniques and algorithms. Here are some of the hottest areas in cryptographic research.
11 reasons encryption is (almost) dead
Massive leaps in computing power, hidden layers, hardware backdoors -- encrypting sensitive data from prying eyes is more precarious than ever