Cisco ETA solves one of the biggest cybersecurity problems

Last summer, Cisco announced a product called Encrypted Traffic Analysis (ETA), which solves one of the biggest cybersecurity problems — finding malware in encrypted traffic. The use of encrypted traffic continues to grow. In fact, it’s over half of all traffic today and will be well over 80 percent by 2020. The benefit of encrypting traffic is […]

Proactively Managing Data Compliance With Encryption Strategies

Read Richard Belch’s article about how businesses can manage data compliance with encryption on Information Security Buzz : The looming General Data Protection Regulation (GDPR) poses a significant concern for U.S. firms, given the high standards outlined. The Gartner research predicts less than 50% of all the US companies that will be held to the […]

Why end-to-end encryption is about more than just privacy

The question of whether regular people need end-to-end encryption will surely be debated for quite some time. But for Alan Duric, CEO and co-founder of Wire, the question can only have a positive answer. Read why Alan Duric of Wire says that end-to-end encryption is more about just privacy on Help Net Security.

Healthcare Data Encryption not ‘Required,’ but Very Necessary

Healthcare cybersecurity is essential for covered entities of all sizes, especially as ransomware attacks and other types of malware become more common. Healthcare data encryption is often discussed in these situations as well, with many in the industry underlining its importance. Read why HIPPA doesnt make healthcare organisations compulsorily encrypt data but it is very […]

Breaking TLS: Good or bad for security?

Read Todd O’Boyle’s article about whether breaking TLS is good or bad for security on Help Net Security : As the use of TLS by malware and phishing increases, some security practitioners are seeking solutions to break TLS so they can monitor all traffic in and out of their network. Breaking TLS is typically accomplished by loading […]

Businesses increasing encryption efforts

Businesses are increasingly adopting encryption strategies, according to a new report by Thales. More than four in ten (41 per cent) of respondents in the report said their organisation has an encryption strategy that is applied ‘consistently’, across the enterprise. Read more about the new report by Thales which reveals that nearly four out of […]

The Long Slog To Getting Encryption Right

Read Ericka Chickowski’s article about encryption on Dark Reading : While enterprises are making meaningful progress on improving their encryption practices, there’s still a lot of work to go. Several major studies out in the last several months have underlined the highs and lows of encryption trends out in the real world. Read his full article […]

Trust Begins With Layer 1 Encryption

Read why Hector Menendez says that trust begins with layer 1 encryption on Dark Reading : At which network layer should we handle security of in-flight data? Some argue the application layer is most appropriate because this is where the user’s personal data, semantics and security requirements reside. Others argue that security should start in the […]

Data breaches are a part of doing business, protection lies in encryption: LAWtrust

Data has become the lifeblood of modern life as everything from room temperatures and health records to banking details and WhatsApp messages are collected and stored. The rapid digital transformation of businesses and services has created an unprecedented amount of data. This data has become so valuable that there are hacking syndicates and lone-wolf hackers who […]

Why quality encryption is actually helping hackers hack

Read why Arra Dacque’s says that end-to-end full-disk encryption is actually helping hackers and cyber criminals on American Genius : FBI General Counsel James A. Brady opened up another angle to the global encryption debate. In a Center for Strategic and International Studies (CSIC) panel, Brady claimed that the current trend in full-disk encryption (FDE) may […]