Peter Wayner

Contributing Editor

Peter Wayner is contributing editor at InfoWorld and the author of more than 16 books on diverse topics, including open source software ("Free for All"), autonomous cars ("Future Ride"), privacy-enhanced computation ("Translucent Databases"), digital transactions ("Digital Cash"), and steganography ("Disappearing Cryptography"). His work regularly appears in InfoWorld, and he consults on software projects big and small. The second edition of his book on robot cars, "Future Ride," is out now. Disclosure: He also writes for Hewlett-Packard's TechBeacon marketing website.

Secure multiparty computation explained: Ensuring trust in untrustworthy environments

11 technologies improving database security

11 technologies improving database security

The database does not have to be a security and privacy liability. These technologies can reduce risk and help ensure regulatory compliance.

What's next for encryption if the RSA algorithm is broken?

What's next for encryption if the RSA algorithm is broken?

A recent, yet to be proven paper claiming to have found a way to "destroy the RSA cryptosystem" has cryptographers asking what might replace it.

16 technology winners and losers, post-COVID

16 technology winners and losers, post-COVID

The coronavirus crisis has shaken up business as usual, with some IT strategies and tools rising to the occasion and others in line for a rethink or tough recovery post-pandemic.

Inrupt offers a standard for controlling data and identity on the web

Inrupt offers a standard for controlling data and identity on the web

Founded by security and web luminaries, Inrupt has commercialized the Solid Project technology to manage sensitive data in a more secure, compliant manner...if enough people buy into its vision.

6 top security technologies to protect remote workers

6 top security technologies to protect remote workers

Zero trust, SASE, and identity management are just some of the technologies companies are deploying to secure home-based workers, systems, and data.

Differential privacy: Pros and cons of enterprise use cases

Differential privacy: Pros and cons of enterprise use cases

Hiding sensitive data in a sea of noise might have more value than encryption in some use cases. Here are the most likely differential privacy applications and their trade-offs.

4 hot areas for encryption innovation

4 hot areas for encryption innovation

Researchers are making progress on a variety of approaches to strengthen encryption techniques and algorithms. Here are some of the hottest areas in cryptographic research.

11 reasons encryption is (almost) dead

Massive leaps in computing power, hidden layers, hardware backdoors -- encrypting sensitive data from prying eyes is more precarious than ever

Security through obscurity: How to cover your tracks online

Security through obscurity: How to cover your tracks online

From Tor to steganography, these six techniques will help obscure the data and traces you leave online

12 Programming Mistakes to Avoid

The dirty dozen of application development pitfalls -- and how to avoid these all-too-common programming blunders

Load More