Trust Begins With Layer 1 Encryption

Read why Hector Menendez says that trust begins with layer 1 encryption on Dark Reading : At which network layer should we handle security of in-flight data? Some argue the application layer is most appropriate because this is where the user’s personal data, semantics and security requirements reside. Others argue that security should start in the […]

Data breaches are a part of doing business, protection lies in encryption: LAWtrust

Data has become the lifeblood of modern life as everything from room temperatures and health records to banking details and WhatsApp messages are collected and stored. The rapid digital transformation of businesses and services has created an unprecedented amount of data. This data has become so valuable that there are hacking syndicates and lone-wolf hackers who […]

Why quality encryption is actually helping hackers hack

Read why Arra Dacque’s says that end-to-end full-disk encryption is actually helping hackers and cyber criminals on American Genius : FBI General Counsel James A. Brady opened up another angle to the global encryption debate. In a Center for Strategic and International Studies (CSIC) panel, Brady claimed that the current trend in full-disk encryption (FDE) may […]

Scale, frequency and causes of certificate-related outages

Certificate-related outages negatively impact the reliability and availability of vital systems and services, according to Venafi. “Certificates and keys are identity and access management for machines, just like user names and passwords are for humans,” said Kevin Bocek, vice president of security strategy and threat intelligence at Venafi. Read Kevin Bocek of Venafi’s article about the scale, […]

Email Encryption On The Rise But Still Not ‘Universal’

The numbers aren’t staggering, but more companies now view encrypting email a priority. New research by Osterman on behalf of Echoworx found that while 45% of organizationsin North America consider email encryption a “very important” or “critical” priority in 2015, that number jumped to 53% in the 2016 study. At the same time, organizations reporting that […]

Invest in encryption and get it right

Read why Mark James says that companies need to invest in encryption on We Live Security : Fines by the UK’s Information Commissioner’s Office (ICO) for security breaches have been a matter of discussion for some time. For most, they seem fairly small; and if we think about the actual monetary value when compared to […]

Security Through Transparency

Read Ryan Hurst and Gary Belvin’s article about security through transparency on Google Blog : Encryption is a foundational technology for the web. We’ve spent a lot of time working through the intricacies of making encrypted apps easy to use and in the process, realized that a generic, secure way to discover a recipient’s public […]

Technical developments in Cryptography: 2016 in Review

While 2016 may not have been the banner year for cryptographic exploits that 2015 was, researchers around the world continued to advance the state of the art. The biggest practical development in crypto for 2016 is Transport Layer Security version 1.3. Read more about the technical developments that happened in cyrptography in 2016 on Electronic […]

Encryption: It’s time to get serious about personal privacy

Read why Jonathan Baker says that it is time for businesses to get serious  about encryption on The Observer : Hackers are out there; people who want your information are out there and they are willing to do what they can to get into your personal devices to retrieve such information and use it against you. […]

End-To-End Encryption Could’ve Protected Yahoo Mail Users From 2014 Data Breach And NSA Spying

Over the past few weeks, it’s been uncovered that half a billion Yahoo Mail accounts were exposed in a record-breaking data breach, but also that Yahoo may have allowed all of its emails to be scanned by the U.S. government, too. In both situations, end-to-end encryption would’ve protected users’ information. Read how end-to-end encryption could […]