Encryption

Encryption news, analysis, research, how-to, opinion, and video.

blind spot side view mirror car vehicle
bitcoin currency blockchain finance bank binary

network security primary2

Why it’s harder for threats to hide behavior on a corporate network

If signatures in cybersecurity are like fingerprints in a criminal investigation, behavioral detection is like profiling – it’s harder to hide, but it’s not foolproof either.

blockchain cryptocurrency digital security

New cryptocurrencies offer better anonymity, new security challenges

Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable.

security internet network encryption privacy padlock

Full disk encryption: do we need it?

Companies should consider implementing full disk encryption alongside other encryption methods on mobile devices.

las vegas nighttime

Board cybersecurity field trips

Maybe this time, what happens in Vegas won't stay in Vegas!

fbi badge gun

FBI chief claims encryption is an 'urgent public safety issue’

After 25 years of "going dark" claims, FBI Director Christopher Wray says not being able to crack the encryption on devices is "a major public safety issue."

data security encryption

Cisco ETA solves one of the biggest cybersecurity problems

Cisco Encrypted Traffic Analysis (ETA), now generally available, addresses one of the biggest pain points in the cybersecurity industry — finding malware in encrypted traffic.

security internet network encryption privacy padlock

What is SSL/TLS? (And why it’s time to upgrade to TLS 1.3)

The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

03 cryptography

Are you crypto-agile?

A recent spate of successful attacks against our most popular and trusted cryptographic algorithms has me hoping that all companies understand the importance of crypto-agility.

2 encryption

Not as secure as you think

How companies mislead the public about security.

Man pointing to security icon for email

DMARC is now an essential part of internet security

Email encryption and authentication standards like DMARC and STARTTLS are becoming essential for closing security gaps.

blockchain ecosystem

Hacking bitcoin and blockchain

Both bitcoin and blockchain are vulnerable to attack. Here's what you need to know to protect yourself and why blockchain is becoming a foundational technology.

hacker login password cliche

How hackers crack passwords and why you can't stop them

Password crackers have access to more stolen passwords and better password hacking software and tools than ever before.

location symantec headquarters flags 300dpi

DigiCert’s acquisition of Symantec’s security business is good news for customers

DigiCert’s already capable team gains some of the industry’s best talent and resources in the area of SSL/TLS certificates and related PKI solutions.

2 encryption

Who wins in a world of 100% encrypted traffic?

With advances in artificial intelligence, security doesn’t have to come at the cost of privacy.

Man pointing to security icon for email

Is universal end-to-end encrypted email possible (or even desirable)?

End-to-end email encryption is getting more attention as security and compliance concerns mount, but practical use cases are rapidly being eaten away by other technologies.

quantum computing KryptAll

A quantum of solace

A digital weapon of mass destruction is just over the horizon. If corporate and government leaders were caught off guard during the recent ransomware attacks, this will truly terrify them.

messaging apps threats security privacy thought bubbles

Can Shakespeare solve our messaging app crisis?

The messaging app Telegram announced earlier this week it was stepping up its efforts to thwart terrorism communication. A college literature professor may have the perfect solution for the problem.

storm clouds dark

Developer hangs patient data out in a cloud—for two years

In 2015, a developer at UIHC inadvertently put the personal data of about 5,300 patients in an open store in the cloud. UIHC found out about it in 2017.

Load More