Items Tagged with "Encryption"
We Can’t Control Devices and People, but We Can Control the Network
April 26, 2017 Added by:Dennis Reilly
Dennis Reilly asks BAI Senior Director of Operations Ryan Morris about current trends he is seeing, including what challenges federal agencies may face.
Comments (0)
Ask a Security Pro: Encryption Explained
April 13, 2017 Added by:Logan Kipp
Modern encryption has become an arms race between brilliant mathematicians and their computers, and hackers and theirs.
Comments (0)
What bicycle thefts can teach us about mobile security
February 17, 2017 Added by:Avi Rosen
Businesses can apply protection to each device and the data it holds, in a way that is appropriate to the device user’s role, and risk profile, which also makes it easier for organizations to lock down and manage the complete mobile security cycle.
Comments (0)
The Dark Side of the Force: Hacktivism Takes Center Stage in 2016
December 21, 2016 Added by:Dan Lohrmann
A new world of hacking motivations and causes is starting to develop — along with convenient, easy-to-use tools for computer novices to do many dangerous things online.
Comments (0)
One Encryption Backdoor Is One Too Many
August 11, 2016 Added by:Joe Levy
Although the FBI no longer needs to force Apple to unlock an iPhone that belonged to one of the San Bernardino terrorists, the debate must continue. Strong encryption that cannot be exploited by external or internal actors is a must for any organization.
Comments (0)
Don't Let the Cure Become the Disease: Granular Control Is the Only Answer to Security Woes Caused By Encryption
June 20, 2016 Added by:Peter Martini
With the proper controls in place, organizations don’t have to fear encryption. Hackers can only succeed in exploiting encryption when organizations lack the right tools to fight back.
Comments (0)
End-to-end Encryption, Today -- Loophole Closed or Moved?
April 22, 2016 Added by:Vanishree Rao
End-to-end encryption does not solve the problem, despite the common perception that it is the holy grail of instant-messaging security. It is necessary that service providers shift their attention toward non-traditional key-derivation mechanisms to close the loophole.
Comments (0)
A Security Lesson from Down Under: Australia’s Banking App Malware Theft
April 20, 2016 Added by:Harvey Boulter
The technology exists for banks to provide spoof-proof communications internally and to their customers, to avoid attacks such as those against the Android apps of major Australian banks.
Comments (0)
Six Things to Know About Computer Theft
March 15, 2016 Added by:Eyal Bek
Besides the usual precautions, encryption can put a huge dent in the problem by making stored information unintelligible to intruders. Self-encrypting drives further help by minimizing the performance impact by offloading encryption to specialized hardware and taking humans out of the picture.
Comments (0)
The Current State of Insecurity: Strategies for Inspecting SSL Traffic
April 17, 2015 Added by:Kasey Cross
Encrypted network traffic improves confidentiality and message integrity, but it also puts organizations at risk. This is because hackers can leverage encryption to conceal their exploits from security devices that do not inspect SSL traffic. Attackers are wising up and taking advantage of this gap in corporate defenses.
Comments (0)
Why Enterprises Are Struggling So Much with Encryption
February 19, 2014 Added by:Patrick Oliver Graf
Encryption. For most organizations, the need for it is very apparent, but for some reason, its implementation often falls well short of goals and expectations. The obvious question here is: why?
Comments (1)
Encryption: The Key to Network Security
December 05, 2013 Added by:Patrick Oliver Graf
The newly released Encrypt the Web report by the Electronic Frontier Foundation (EFF) illustrates that even large, well-known enterprises are susceptible to lapses in properly securing network communications.
Comments (0)
Encrypting Data At Rest Or In The Cloud: Is It Value Adding?
October 16, 2013 Added by:Hani Banayoti
Consider encryption at rest but make informed decisions about its value and protection afforded.
Comments (2)
RSA Abandons Suspect NIST Encryption Algorithm
September 21, 2013 Added by:Anthony M. Freed
EMC's RSA security unit sent an advisory to their developer customers warning against use of a toolkit that employs an NIST encryption algorithm by default that is suspected to have been “backdoored” by the NSA.
Comments (0)
Why Elliptic Curve Cryptography is Necessary for Secure Remote Access
August 26, 2013 Added by:Patrick Oliver Graf
Experts warn that within the next several years, the RSA public key cryptography system could even potentially become obsolete. If that is the case, how will enterprises be able to ensure secure remote access in the near-future?
Comments (1)
Today's Mobile Device Data Protection Must Go Beyond Encryption
August 21, 2013 Added by:Cam Roberson
Employers can be diligent in installing encryption protection software on the devices their employees use, but what happens if the password is compromised? Whenever the password is known, the laptop, smartphone or tablet is at no less security risk with encryption as it is without.