Encryption is one of the security linchpins that spans our IT deployments, and is central to keeping us compliant, maintaining proper separation of duties, enforcing security, and providing the artifacts to keep auditors happy. This
The developer behind Lavabit, an email service that noted leaker Edward Snowden used, is releasing source code for an open-source, end-to-end encrypted email standard that promises surveillance-proof messaging.
President-elect Donald Trump has turned over the Android phone he used for tweeting and will use a more secure phone with encryption capabilities that was approved by the Secret Service, according to news reports.
Data breaches constantly threaten the modern enterprise. And the risk continues to grow: In 2015, the total number of identities exposed via data breaches increased 23%, to 429 million. Time-to-compromise is now measured in minutes,
GoDaddy, one of the world's largest domain registrars and certificate authorities, revoked almost 9,000 SSL certificates this week after it learned that its domain validation system has had a serious bug for the past five months.
Encrypted web communication routinely bypasses enterprise security controls. Left unscanned, these channels are perfect vehicles for hiding infection, command & control, and data exfiltration. This paper examines the malicious use of
Encryption keeps data confidential, but we're left unprotected from threats that may be embedded in the data. In fact, encryption actually conceals these threats and adds network performance burdens for organizations that wish to
Ransomware creators are increasingly targeting companies and other organizations, sometimes using techniques borrowed from cyberespionage attacks, because they're likely to pay more money for their data.