Encryption

Encryption | News, how-tos, features, reviews, and videos

Quantum computing / security
Encrypted blocks of multicolored data cubes rolling out.

The United States Constitution and Bill of RIghts with lock and encryption overlay.

US Department of Justice push for encryption backdoors might run afoul of First Amendment

Is encryption code speech? Earlier court rulings suggest that it is, legally, and therefore subject to First Amendment protections.

open door with sunlight shining through

Justice Department takes another run at encryption backdoors with ‘lawful access’

Law enforcement officials and experts on the distribution of child pornography gathered on Friday to make the emotional, if not technological, case that tech companies should open up their encryption schemes to police investigating...

The Google universal quantum computer.

Quantum supremacy might be here, upending conventional encryption

Last week Google posted and quickly took down a report announcing a stunning quantum computing milestone. Regardless of whether the report was premature, conventional encryption’s days are numbered.

Email encryption  >  A key + a three-dimensional 'at' symbol bearing a series of locks.

The top 5 email encryption tools: More capable, better integrated

Most of the email encryption solution vendors have broadened the scope of their products to include anti-phishing, anti-spam, and data loss prevention (DLP).

Chain links secure multiple data stream segments.

How MIT's Fiat Cryptography might make the web more secure

By automating the writing of cryptographic algorithms, Fiat Cryptography can remove errors, produce more secure code, and boost performance.

CSO > Micsoroft Windows logo emblazoned on a security shield in a field of abstract binary data.

Review: How Barac ETV analyzes encrypted data streams

Barac’s Encrypted Traffic Visibility Platform can halt encrypted attacks — without breaking the encryption. In our tests, the results seemed mostly instantaneous.

Network encryption / encrypted data transfers

Safely deploying TLS certificates: 5 common mistakes to avoid

A properly configured TLS cert is the first layer of defense for data in transit. Here are some tips to ensure a secure deployment.

tt19 030 thumb
video

How updates to MongoDB work to prevent data breaches | TECH(talk)

CSO senior writer Lucian Constantin and Computerworld Executive Editor Ken Mingis talk database security and how MongoDB's new field-level encryption takes security to the next level.

CSO > Security automation

New MongoDB field-level encryption can help prevent data breaches

MongoDB aims to prevent exposed data stores by encrypting data in a way that makes it useless if compromised.

keep out sign do not tresspass privacy authentication access barbed wire by tim husser getty

What is PKI? And how it secures just about everything online

Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption. It is baked into every web browser in use today to secure...

Let's Encrypt automated encryption gears

How to automate Let’s Encrypt certificate authority in AWS using PowerShell

You can still automate Let's Encrypt even if your system requires a DNS challenge. Using these PowerShell scripts and Amazon Web Services' DNS service Route 53 will do the trick.

predictive analytics numbers retro man with binoculars future horizon spying looking

What is a side channel attack? How these end-runs around encryption put everyone at risk

Side channel attacks on cryptography break confidentiality by exploiting information produced by the encryption — such as van Eck phreaking in a TEMPEST attack, courtesy the van across the street.

binary code

3 ways to monitor encrypted network traffic for malicious activity

Ubiquitous encryption of network traffic prevents you from performing deep packet inspection, but you can still detect and prevent a lot of attacks.

one lightbulb glowing among a pack of unlit bulbs

RSAC Innovation Sandbox 2019: Cloud, identity, application security take center stage

Take note of these startups. Innovation Sandbox has been around for 15 years. A whopping 42 percent of finalists from its first ten years have been acquired. Finalists in the past five years have received $1.5B in funding.

data security encryption

Can owning your company’s encryption lead to better security?

While the current vendor environment clearly poses significant challenges and risks to businesses entrusting them with their data, use of encryption can, at least in many cases, materially mitigate that risk. The devil, however, is in...

secure encrypted internet web browser alert

EFF has an encryption plan for the entire internet

Spurred by government surveillance of data, the Electronic Frontier Foundation is making progress toward its goal of encrypting all internet traffic using technology and scorecards.

04 encryption

Three encrypted Slack alternatives worth a look

Slack is not end-to-end encrypted, leaving workplaces that use the popular collaboration tool vulnerable to both hackers and nation-state attacks. These encrypted alternatives will keep your team chats private.

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

What is Australia's AA Bill and how will it affect US companies?

Australia's new AA Bill turns Australian employees and vendors into a supply chain security risk.

Load More
You Might Also Like