Please turn on your JavaScript for this page to function normally.
Cybertech NYC 2022
Cybertech NYC 2022 video walkthrough

Help Net Security is in New York City this week for Cybertech NYC 2022 at the Javits Center. This event, which focuses on innovation and the future of cyber, brings together …

Cybertech NYC 2022
Photos: Cybertech NYC 2022

Help Net Security is in New York City at the Javits Center this week for Cybertech NYC 2022. Here’s a closer look at this event, which focuses on innovation and the …

key
Why companies can no longer hide keys under the doormat

For good reason, companies trust in encryption, blockchain, zero trust access, distributed or multi-party strategies, and other core technologies. At the same time, companies …

How to eliminate the weak link in public cloud-based multi-party computation

Secure multi-party computation (MPC) has seen steady evolution to tackle many scientific challenges. These include enabling the creation and tuning of AI or machine learning …

Handshake
Parfin selects Anjuna Security to protect MPC custody assets against risk and misuse

Anjuna Security and Parfin announced that the Anjuna Confidential Cloud Software solution now enables Parfin’s MPC Custody platform to utilize the highly secure hardware …

Appointments
Anjuna Security expands executive team with four industry executives

Anjuna Security announced it is accelerating its go-to-market capabilities in the fast-emerging confidential computing market with the arrival of four seasoned industry …

numbers
From fragmented encryption chaos to uniform data protection

Encryption is so critical to enterprise security that it’s almost like air: It’s a necessity, it’s everywhere, and we can’t live without it. On the surface, having encryption …

cloud
Can the public cloud become confidential?

It’s been often said that the only two certain things in life are death and taxes. Over the past ten years, it seems data breaches can be added to this list. Can an …

cloud
The next big thing in cloud computing? Shh… It’s confidential

The business-driven explosion of demand for cloud-based services has made the need to provide highly secure cloud computing more urgent. Many businesses that work with …

data
Runtime data no longer has to be vulnerable data

Today, the security model utilized by nearly all organizations is so weak that the mere act of creating new data comes with the immutable assumption that such data will become …

lock
Secure enclave protection for AI and ML

You can’t swing a virtual bat without hitting someone touting the value of artificial intelligence (AI) and machine learning (ML) technologies to transform big data and human …

face
Maximizing data privacy: Making sensitive data secure by default

Maximizing data privacy should be on every organization’s priority list. We all know how important it is to keep data and applications secure, but what happens when …

Don't miss

Cybersecurity news