Businesses increasing encryption efforts

Businesses are increasingly adopting encryption strategies, according to a new report by Thales. More than four in ten (41 per cent) of respondents in the report said their organisation has an encryption strategy that is applied ‘consistently’, across the enterprise. Read more about the new report by Thales which reveals that nearly four out of […]

The Long Slog To Getting Encryption Right

Read Ericka Chickowski’s article about encryption on Dark Reading : While enterprises are making meaningful progress on improving their encryption practices, there’s still a lot of work to go. Several major studies out in the last several months have underlined the highs and lows of encryption trends out in the real world. Read his full article […]

Trust Begins With Layer 1 Encryption

Read why Hector Menendez says that trust begins with layer 1 encryption on Dark Reading : At which network layer should we handle security of in-flight data? Some argue the application layer is most appropriate because this is where the user’s personal data, semantics and security requirements reside. Others argue that security should start in the […]

Data breaches are a part of doing business, protection lies in encryption: LAWtrust

Data has become the lifeblood of modern life as everything from room temperatures and health records to banking details and WhatsApp messages are collected and stored. The rapid digital transformation of businesses and services has created an unprecedented amount of data. This data has become so valuable that there are hacking syndicates and lone-wolf hackers who […]

Why quality encryption is actually helping hackers hack

Read why Arra Dacque’s says that end-to-end full-disk encryption is actually helping hackers and cyber criminals on American Genius : FBI General Counsel James A. Brady opened up another angle to the global encryption debate. In a Center for Strategic and International Studies (CSIC) panel, Brady claimed that the current trend in full-disk encryption (FDE) may […]

Scale, frequency and causes of certificate-related outages

Certificate-related outages negatively impact the reliability and availability of vital systems and services, according to Venafi. “Certificates and keys are identity and access management for machines, just like user names and passwords are for humans,” said Kevin Bocek, vice president of security strategy and threat intelligence at Venafi. Read Kevin Bocek of Venafi’s article about the scale, […]

Email Encryption On The Rise But Still Not ‘Universal’

The numbers aren’t staggering, but more companies now view encrypting email a priority. New research by Osterman on behalf of Echoworx found that while 45% of organizationsin North America consider email encryption a “very important” or “critical” priority in 2015, that number jumped to 53% in the 2016 study. At the same time, organizations reporting that […]

Invest in encryption and get it right

Read why Mark James says that companies need to invest in encryption on We Live Security : Fines by the UK’s Information Commissioner’s Office (ICO) for security breaches have been a matter of discussion for some time. For most, they seem fairly small; and if we think about the actual monetary value when compared to […]

Security Through Transparency

Read Ryan Hurst and Gary Belvin’s article about security through transparency on Google Blog : Encryption is a foundational technology for the web. We’ve spent a lot of time working through the intricacies of making encrypted apps easy to use and in the process, realized that a generic, secure way to discover a recipient’s public […]

Technical developments in Cryptography: 2016 in Review

While 2016 may not have been the banner year for cryptographic exploits that 2015 was, researchers around the world continued to advance the state of the art. The biggest practical development in crypto for 2016 is Transport Layer Security version 1.3. Read more about the technical developments that happened in cyrptography in 2016 on Electronic […]