Encryption

Encryption | News, how-tos, features, reviews, and videos

Quantum, blue glow, 3D image
robotics - artificial intelligence

digital screen with encryption data background big data with binary picture id1332211233

EnterpriseDB adds Transparent Data Encryption to PostgreSQL

The new Transparent Data Encryption (TDE) feature will be shipped along with the company’s enterprise version of its database.

4 encryption keys

Fortanix unveils AWS integration for centralized key management

Multicloud users have a new option for encryption key management across platforms, with the news that Fortanix has now integrated AWS support.

Email encryption  >  An encrypted binary 'at' symbol with a keyhole.

AWS releases Wickr, its encrypted messaging service for enterprises

The release of the enterprise version of the encrypted messaging service, announced at AWS re:Invent, is designed to allow secure collaboration across messaging, voice, video and file sharing.

Encrypted blocks of multicolored data cubes rolling out.

Intro to MongoDB’s queryable encryption

MongoDB 6.0 introduces a preview feature that pulls off the quasi-magical feat of allowing encrypted data to be used as the target of searches, without ever transmitting the keys to the database.

Encryption  >  A conceptual technological lock and encrypted code.

NIST names new post-quantum cryptography standards

One public-key encryption and three digital signature algorithms determined to provide the best defense against quantum attacks.

5 cryptography and data protection

What is cryptography? How algorithms keep information secret and safe

Cryptography is the art of keeping information secret and safe by transforming it into form that unintended recipients cannot understand. It makes secure data transmission over the internet possible.

Encryption  >  A conceptual technological lock and encrypted code.

QuSecure launches end-to-end post-quantum cybersecurity solution

QuSecure claims new solution is the industry’s first end-to-end quantum software-based platform that protects encrypted communications and data using a quantum-secure channel.

https ssl certificate

How to choose a certificate management tool

Managing certificates that hold all your encryption secrets is impossible without the right tool. Here's how to narrow the field.

Quantum computing / security

U.S. White House releases ambitious agenda to mitigate the risks of quantum computing

The Biden administration issued an executive order to ensure U.S. leadership in quantum computing and a memorandum to mitigate its security risks.

Encryption  >  A conceptual technological lock and encrypted code.

PureVPN introduces quantum-resistant feature to enhance security, tackle threats

VPN provider has partnered with quantum computing company Quantinuum to deploy quantum-resistant encryption keys.

security internet network encryption privacy padlock

What is SSL? How SSL certificates enable encrypted communication

SSL and its descendent, TLS, are protocols that encrypt internet traffic, making secure internet communication and ecommerce possible.

Encryption  >  A conceptual technological lock and encrypted code.

Preparing for the quantum-safe encryption future

Organizations soon need to transition to quantum-safe encryption to address new cybersecurity threats. Here’s how businesses can prepare.

Network encryption / encrypted data transfers

LiveAction tackles encryption blindness with new offering

ThreatEye NV combines behavior analysis and machine learning to expose malware in encrypted network traffic.

Quantum computing  >  A quantum processor radiates power.

New quantum key distribution network resistant to quantum attacks

A claimed first-of-a-kind quantum key distribution network offers 800 Gbps encryption under real-world environmental conditions and has been demonstrated to detect and defend against quantum threats.

A protected padlock with checkmark amid a field of abstract data.

4 alternatives to encryption backdoors, but no silver bullet

Alternatives to backdoors in end-to-end encryption exist, but not all address privacy and security concerns, say experts at last week’s Engima conference.

video conferencing / remote work

9 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Meet, Cisco Webex, FaceTime, Tauria, Signal, Wire and WhatsApp. What does their encryption look like? What are the trade-offs?

Encryption  >  A conceptual technological lock and encrypted code.

Collect today, decrypt tomorrow: How Russia and China are preparing for quantum computing

All encrypted data will eventually become vulnerable to quantum computing along with the secrets they hold.

Encryption  >  Encrypted data / hexadecimal code

Spike in encrypted malware poses dual challenge for CISOs

Faced with a surge in malware hidden in encrypted traffic, CISOs are being tasked with managing technical solutions while also adhering to privacy considerations.

Load More
You Might Also Like