Quantum computing capabilities are already impacting your organization. While data encryption and operational disruption have long troubled Chief Information Security Officers (CISOs), the threat posed by emerging quantum computing capabilities…
Browsing CategoryEncryption
Getting Lost in an Encryption Maze? Try a Key Management System
Encryption is an essential part of any data security strategy. A key management system (KMS) can make encryption easier by enabling you to transform data to indecipherable cyphertext and control…
What You Need to Know About Data Encryption Right Now
You might feel like you’ve heard these imperatives a million times: “You need to encrypt your data.” “Your information isn’t secure unless you encrypt it.” “You need to eat your…
From Thanos to Prometheus: When Ransomware Encryption Goes Wrong
IBM Security X-Force researchers have recently reverse-engineered Prometheus ransomware samples as part of ongoing incident response operations. X-Force has found that samples that infected organizational networks featured flawed encryption. This…
From Thanos to Prometheus: When Ransomware Encryption Goes Wrong
IBM Security X-Force researchers have recently reverse-engineered Prometheus ransomware samples as part of ongoing incident response operations. X-Force has found that samples that infected organizational networks featured flawed encryption. This…
The OSI Model and You Part 6: Stopping Threats at the OSI Presentation Layer
Our travels through the OSI seven layers of networking have shown that each layer has specific weaknesses and angles of attack. In turn, each has its best defenses. Now, we’ve…
How Good Transaction Security Can Make Customer Visits Easier
Every time I start to put my information into an online form, especially if it’s my credit card number or a banking transaction, I almost always pause. There was a…
Cloud Security: Why Being Intentional in Encryption Matters
Cloud security and web application security demand technology and practices that protect applications and data hosted remotely. Good old-fashioned data encryption is chief among these. The reasons for encrypting cloud…
WhatsApp’s Fight With India Could Have Global Repercussions
The country’s “traceability” requirement would undermine the privacy of the encrypted messaging app’s users far beyond its borders.
Fleeing WhatsApp for Privacy? Don’t Turn to Telegram
Because the chat app doesn’t encrypt conversations by default—or at all for group chats—security professionals often warn against it.