Encryption

Encryption | News, how-tos, features, reviews, and videos

Email encryption  >  A key + a three-dimensional 'at' symbol bearing a series of locks.
chain links securing multiple transactions / big data / security / blockchain

CSO > Micsoroft Windows logo emblazoned on a security shield in a field of abstract binary data.

Review: How Barac ETV analyzes encrypted data streams

Barac’s Encrypted Traffic Visibility Platform can halt encrypted attacks — without breaking the encryption. In our tests, the results seemed mostly instantaneous.

Network encryption / encrypted data transfers

Safely deploying TLS certificates: 5 common mistakes to avoid

A properly configured TLS cert is the first layer of defense for data in transit. Here are some tips to ensure a secure deployment.

tt19 030 thumb
video

How updates to MongoDB work to prevent data breaches | TECH(talk)

CSO senior writer Lucian Constantin and Computerworld Executive Editor Ken Mingis talk database security and how MongoDB's new field-level encryption takes security to the next level.

CSO > Security automation

New MongoDB field-level encryption can help prevent data breaches

MongoDB aims to prevent exposed data stores by encrypting data in a way that makes it useless if compromised.

keep out sign do not tresspass privacy authentication access barbed wire by tim husser getty

What is PKI? And how it secures just about everything online

Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption. It is baked into every web browser in use today to secure...

Let's Encrypt automated encryption gears

How to automate Let’s Encrypt certificate authority in AWS using PowerShell

You can still automate Let's Encrypt even if your system requires a DNS challenge. Using these PowerShell scripts and Amazon Web Services' DNS service Route 53 will do the trick.

predictive analytics numbers retro man with binoculars future horizon spying looking

What is a side channel attack? How these end-runs around encryption put everyone at risk

Side channel attacks on cryptography break confidentiality by exploiting information produced by the encryption — such as van Eck phreaking in a TEMPEST attack, courtesy the van across the street.

binary code

3 ways to monitor encrypted network traffic for malicious activity

Ubiquitous encryption of network traffic prevents you from performing deep packet inspection, but you can still detect and prevent a lot of attacks.

one lightbulb glowing among a pack of unlit bulbs

RSAC Innovation Sandbox 2019: Cloud, identity, application security take center stage

Take note of these startups. Innovation Sandbox has been around for 15 years. A whopping 42 percent of finalists from its first ten years have been acquired. Finalists in the past five years have received $1.5B in funding.

data security encryption

Can owning your company’s encryption lead to better security?

While the current vendor environment clearly poses significant challenges and risks to businesses entrusting them with their data, use of encryption can, at least in many cases, materially mitigate that risk. The devil, however, is in...

secure encrypted internet web browser alert

EFF has an encryption plan for the entire internet

Spurred by government surveillance of data, the Electronic Frontier Foundation is making progress toward its goal of encrypting all internet traffic using technology and scorecards.

04 encryption

Three encrypted Slack alternatives worth a look

Slack is not end-to-end encrypted, leaving workplaces that use the popular collaboration tool vulnerable to both hackers and nation-state attacks. These encrypted alternatives will keep your team chats private.

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

What is Australia's AA Bill and how will it affect US companies?

Australia's new AA Bill turns Australian employees and vendors into a supply chain security risk.

security internet network encryption privacy padlock

What is SSL, TLS? And how this encryption protocol works

The SSL/TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

8 encryption

Encryption is the best way to protect payment card transaction data

Criminals are going to steal payment card transaction data, but it won't matter if that data is devalued through encryption.

login password - user permissions - administrative control

From CIA to #CIA

The evolution of our security journey using the three pillars of security.

race compet starting sucess leader prepar challenge

Start preparing today for the future of quantum computing

With so many issues competing for an IT security professional's time, it’s difficult to find time for future planning. That being said, now is the time of professionals to have quantum computing on the radar.

digital network privacy - eavesdropping

Are mixnets the answer to anonymous communications?

Combined with strong encryption such as the Signal protocol, modern mixnets could achieve the Holy Grail: metadata-resistant secure communications.

Load More
You Might Also Like