Items Tagged with "Encryption"


591c39c65cf5c298ccd0f1cd5818e961

End-to-end Encryption, Today -- Loophole Closed or Moved?

April 22, 2016 Added by:Vanishree Rao

End-to-end encryption does not solve the problem, despite the common perception that it is the holy grail of instant-messaging security. It is necessary that service providers shift their attention toward non-traditional key-derivation mechanisms to close the loophole.

Comments  (0)

564d3c4d8288860c70049e09a49d1ae1

A Security Lesson from Down Under: Australia’s Banking App Malware Theft

April 20, 2016 Added by:Harvey Boulter

The technology exists for banks to provide spoof-proof communications internally and to their customers, to avoid attacks such as those against the Android apps of major Australian banks.

Comments  (0)

179bc88eff504b5632ac8fbd9ee7b09d

Six Things to Know About Computer Theft

March 15, 2016 Added by:Eyal Bek

Besides the usual precautions, encryption can put a huge dent in the problem by making stored information unintelligible to intruders. Self-encrypting drives further help by minimizing the performance impact by offloading encryption to specialized hardware and taking humans out of the picture.

Comments  (0)

52ff7cf6fd88aebfb48b323e6251cd95

The Current State of Insecurity: Strategies for Inspecting SSL Traffic

April 17, 2015 Added by:Kasey Cross

Encrypted network traffic improves confidentiality and message integrity, but it also puts organizations at risk. This is because hackers can leverage encryption to conceal their exploits from security devices that do not inspect SSL traffic. Attackers are wising up and taking advantage of this gap in corporate defenses.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Why Enterprises Are Struggling So Much with Encryption

February 19, 2014 Added by:Patrick Oliver Graf

Encryption. For most organizations, the need for it is very apparent, but for some reason, its implementation often falls well short of goals and expectations. The obvious question here is: why?

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

Encryption: The Key to Network Security

December 05, 2013 Added by:Patrick Oliver Graf

The newly released Encrypt the Web report by the Electronic Frontier Foundation (EFF) illustrates that even large, well-known enterprises are susceptible to lapses in properly securing network communications.

Comments  (0)

3071bd3c5c013c8c3defcccad0259c16

Encrypting Data At Rest Or In The Cloud: Is It Value Adding?

October 16, 2013 Added by:Hani Banayoti

Consider encryption at rest but make informed decisions about its value and protection afforded.

Comments  (2)

6d117b57d55f63febe392e40a478011f

RSA Abandons Suspect NIST Encryption Algorithm

September 21, 2013 Added by:Anthony M. Freed

EMC's RSA security unit sent an advisory to their developer customers warning against use of a toolkit that employs an NIST encryption algorithm by default that is suspected to have been “backdoored” by the NSA.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Why Elliptic Curve Cryptography is Necessary for Secure Remote Access

August 26, 2013 Added by:Patrick Oliver Graf

Experts warn that within the next several years, the RSA public key cryptography system could even potentially become obsolete. If that is the case, how will enterprises be able to ensure secure remote access in the near-future?

Comments  (1)

52a995fead03e1d828980d4b3efd2719

Today's Mobile Device Data Protection Must Go Beyond Encryption

August 21, 2013 Added by:Cam Roberson

Employers can be diligent in installing encryption protection software on the devices their employees use, but what happens if the password is compromised? Whenever the password is known, the laptop, smartphone or tablet is at no less security risk with encryption as it is without.

Comments  (50)

Af9c34417f8e5e0d240850bb353b5d40

The Private Communication Encryption Conundrum

July 08, 2013 Added by:Keith Mendoza

Demanding that communication providers offer encryption of private communication is great; however, there are major hurdles that needs to be overcome from a technological and usability standpoint.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Complimentary IT Security Resources [May 13, 2013]

May 13, 2013 Added by:InfosecIsland News

As an Infosec Island reader, we are pleased to offer you the following complimentary IT security resources for the week of May 13, 2013.

Comments  (0)

Cc281a493d63c492153ba35b86dcc794

Top 10 Encryption Benefits

April 30, 2013 Added by:Steve Pate

If deployed correctly, encryption does not need to be a headache. Instead, encryption can be an enabler to achieve the flexibility, compliance and data privacy that is required in today’s business environments. Below are top 10 benefits for those considering encryption.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Are you meeting your perceived security obligations?

January 19, 2013 Added by:Tripwire Inc

Security professionals today identify lack of qualified talent and lack of organizational funding as a key problem to their daily job; which probably implies that they are doing what they can with what they have; which likely may not meet expectations...

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Cybersecurity and 'Smart Encryption'

December 20, 2012 Added by:Larry Karisny

Paul “Prem” Sobel is a Cal Tech MS in electrical engineering and has dedicated a 40-year career to protecting mission-critical systems. He worked with IBM, NASA, Northrop and Intel before launching MerlinCryption LLC. In this edited interview, Sobel discusses security technologies and critical infrastructure vulnerabilities...

Comments  (0)

94c7ac665bbf77879483b04272744424

Low-Cost Ways to Make Your Network More Secure

November 26, 2012 Added by:Marc Quibell

There are improvements you can introduce that are seamless, low-cost , don't present a new burden to your users, and/or are easy to implement. So in between your major IT Security projects that may or may not happen, why not improve you security posture and lower your overall risks?

Comments  (2)

Page « < 1 - 2 - 3 - 4 - 5 > »