Encryption

Encryption | News, how-tos, features, reviews, and videos

Encrypted blocks of multicolored data cubes rolling out.
Encryption  >  A conceptual technological lock and encrypted code.

5 cryptography and data protection

What is cryptography? How algorithms keep information secret and safe

Cryptography is the art of keeping information secret and safe by transforming it into form that unintended recipients cannot understand. It makes secure data transmission over the internet possible.

Encryption  >  A conceptual technological lock and encrypted code.

QuSecure launches end-to-end post-quantum cybersecurity solution

QuSecure claims new solution is the industry’s first end-to-end quantum software-based platform that protects encrypted communications and data using a quantum-secure channel.

https ssl certificate

How to choose a certificate management tool

Managing certificates that hold all your encryption secrets is impossible without the right tool. Here's how to narrow the field.

Quantum computing / security

U.S. White House releases ambitious agenda to mitigate the risks of quantum computing

The Biden administration issued an executive order to ensure U.S. leadership in quantum computing and a memorandum to mitigate its security risks.

Encryption  >  A conceptual technological lock and encrypted code.

PureVPN introduces quantum-resistant feature to enhance security, tackle threats

VPN provider has partnered with quantum computing company Quantinuum to deploy quantum-resistant encryption keys.

security internet network encryption privacy padlock

What is SSL? How SSL certificates enable encrypted communication

SSL and its descendent, TLS, are protocols that encrypt internet traffic, making secure internet communication and ecommerce possible.

Encryption  >  A conceptual technological lock and encrypted code.

Preparing for the quantum-safe encryption future

Organizations soon need to transition to quantum-safe encryption to address new cybersecurity threats. Here’s how businesses can prepare.

Network encryption / encrypted data transfers

LiveAction tackles encryption blindness with new offering

ThreatEye NV combines behavior analysis and machine learning to expose malware in encrypted network traffic.

Quantum computing  >  A quantum processor radiates power.

New quantum key distribution network resistant to quantum attacks

A claimed first-of-a-kind quantum key distribution network offers 800 Gbps encryption under real-world environmental conditions and has been demonstrated to detect and defend against quantum threats.

A protected padlock with checkmark amid a field of abstract data.

4 alternatives to encryption backdoors, but no silver bullet

Alternatives to backdoors in end-to-end encryption exist, but not all address privacy and security concerns, say experts at last week’s Engima conference.

video conferencing / remote work

9 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Meet, Cisco Webex, FaceTime, Tauria, Signal, Wire and WhatsApp. What does their encryption look like? What are the trade-offs?

Encryption  >  A conceptual technological lock and encrypted code.

Collect today, decrypt tomorrow: How Russia and China are preparing for quantum computing

All encrypted data will eventually become vulnerable to quantum computing along with the secrets they hold.

Encryption  >  Encrypted data / hexadecimal code

Spike in encrypted malware poses dual challenge for CISOs

Faced with a surge in malware hidden in encrypted traffic, CISOs are being tasked with managing technical solutions while also adhering to privacy considerations.

broken binary code matrix / breached / failed / hacked

Twitch breach highlights dangers of choosing ease of access over security

Attackers essentially broke into the Twitch house and cleaned out everything. Following least-privilege access principles and encrypted datasets will help others avoid that scenario.

Encrypted blocks of multicolored data cubes rolling out.

Steganography explained and how to protect against it

Steganography is reasonably easy to implement yet difficult to detect, which is why threat actors use it to deliver malware, evade detection, and gain persistence.

radar grid / computer circuits / intrusion detection / scanning

LockFile ransomware uses intermittent encryption to evade detection

This newly discovered ransomware works fast, has multiple ways to avoid detection, and preys on Windows systems with known vulnerabilities.

A binary eye sits within the center of a targeted virtual framework.

Apple plan to scan users’ iCloud photos raises new fears of government-mandated data access

Experts argue that Apple is clearing a path for governments to gain access to their citizens' data--essentially an encryption backdoor.

database data center futuristic technology

11 technologies improving database security

The database does not have to be a security and privacy liability. These technologies can reduce risk and help ensure regulatory compliance.

Load More
You Might Also Like