Encryption
Encryption | News, how-tos, features, reviews, and videos
What is PKI? And how it secures just about everything online
Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption. It is baked into every web browser in use today to secure...
How close are we to breaking encryption with quantum computing?
Not as close as you might fear, but quantum encryption cracking is on its way. So, it's time to start getting ready for it.
Is the EARN-IT Act a backdoor attempt to get encryption backdoors?
New bipartisan US legislation to fight online child exploitation incentivizes companies to drop end-to-end encryption, critics say.
The race for quantum-proof cryptography
Lawmakers briefed on quantum computing’s threat to encryption and the urgent need for mathematical research.
Has the quantum crypto break already happened?
Better quantum algorithms and a strange silence since last year from quantum computing researchers suggest that we are closer to breaking traditional encryption than most people believe.
US Department of Justice push for encryption backdoors might run afoul of First Amendment
Is encryption code speech? Earlier court rulings suggest that it is, legally, and therefore subject to First Amendment protections.
Justice Department takes another run at encryption backdoors with ‘lawful access’
Law enforcement officials and experts on the distribution of child pornography gathered on Friday to make the emotional, if not technological, case that tech companies should open up their encryption schemes to police investigating...
Quantum supremacy might be here, upending conventional encryption
Last week Google posted and quickly took down a report announcing a stunning quantum computing milestone. Regardless of whether the report was premature, conventional encryption’s days are numbered.
The top 5 email encryption tools: More capable, better integrated
Most of the email encryption solution vendors have broadened the scope of their products to include anti-phishing, anti-spam, and data loss prevention (DLP).
How MIT's Fiat Cryptography might make the web more secure
By automating the writing of cryptographic algorithms, Fiat Cryptography can remove errors, produce more secure code, and boost performance.
Review: How Barac ETV analyzes encrypted data streams
Barac’s Encrypted Traffic Visibility Platform can halt encrypted attacks — without breaking the encryption. In our tests, the results seemed mostly instantaneous.
Safely deploying TLS certificates: 5 common mistakes to avoid
A properly configured TLS cert is the first layer of defense for data in transit. Here are some tips to ensure a secure deployment.
New MongoDB field-level encryption can help prevent data breaches
MongoDB aims to prevent exposed data stores by encrypting data in a way that makes it useless if compromised.
How to automate Let’s Encrypt certificate authority in AWS using PowerShell
You can still automate Let's Encrypt even if your system requires a DNS challenge. Using these PowerShell scripts and Amazon Web Services' DNS service Route 53 will do the trick.
What is a side channel attack? How these end-runs around encryption put everyone at risk
Side channel attacks on cryptography break confidentiality by exploiting information produced by the encryption — such as van Eck phreaking in a TEMPEST attack, courtesy the van across the street.
3 ways to monitor encrypted network traffic for malicious activity
Ubiquitous encryption of network traffic prevents you from performing deep packet inspection, but you can still detect and prevent a lot of attacks.
RSAC Innovation Sandbox 2019: Cloud, identity, application security take center stage
Take note of these startups. Innovation Sandbox has been around for 15 years. A whopping 42 percent of finalists from its first ten years have been acquired. Finalists in the past five years have received $1.5B in funding.
Can owning your company’s encryption lead to better security?
While the current vendor environment clearly poses significant challenges and risks to businesses entrusting them with their data, use of encryption can, at least in many cases, materially mitigate that risk. The devil, however, is in...
EFF has an encryption plan for the entire internet
Spurred by government surveillance of data, the Electronic Frontier Foundation is making progress toward its goal of encrypting all internet traffic using technology and scorecards.
Three encrypted Slack alternatives worth a look
Slack is not end-to-end encrypted, leaving workplaces that use the popular collaboration tool vulnerable to both hackers and nation-state attacks. These encrypted alternatives will keep your team chats private.
-
eGuide
Sponsored -
White Paper
-
Video/Webcast
Sponsored -
Video/Webcast
Sponsored -
White Paper