encryption
Starbleed vulnerability: Attackers can gain control over FPGAs
Field Programmable Gate Arrays, FPGAs for short, are flexibly programmable computer chips that are considered very secure components in many applications. Starbleed …
Researchers develop self-healing and self-concealing PUF for hardware security
A team of researchers from the National University of Singapore (NUS) has developed a novel technique that allows Physically Unclonable Functions (PUFs) to produce more …
10 considerations in order to ensure business continuity for PKI
Every year, enterprises face unforeseen events that can disrupt operations. These events are rarely predictable and often create significant challenges for IT and security …
Encryption is finally being used primarily to protect personal data rather than just for compliance
As organizations accelerate digital initiatives such as cloud and the IoT, and data volumes and types continue to rise, IT professionals cite protection of customer personal …
TLS 1.3: Slow adoption of stronger web encryption is empowering the bad guys
For twelve years, the standard internet encryption has been Transport Layer Security (TLS) 1.2. Following its roots takes you back to the first version of the Secure Sockets …
Businesses can avoid fines if customer data is encrypted or redacted
Encryption provides the best defense against any fines that might be levied for violations or data breaches under CCPA, according to ESG and Fortanix. What can you do? The …
Personal data protection today: We should demand more
The growing number of cybersecurity incidents reported each year – and the fact that many attacks remain unreported for security and PR reasons – can leave even …
Overcoming crypto assessment challenges to improve quantum readiness
Large enterprises have a major problem when it comes to preparing for the advent of quantum computing: few, if any, have a working knowledge of all the locations where …
Some commercial password managers vulnerable to attack by fake apps
Security experts recommend using a complex, random and unique password for every online account, but remembering them all would be a challenging task. That’s where …
Mixed-signal circuits can stop side-channel attacks against IoT devices
Purdue University innovators have unveiled technology that is 100 times more resilient to electromagnetic and power attacks, to stop side-channel attacks against IoT devices. …
Jon Callas: Encryption is a technology that rearranges power
In anticipation of his keynote at HITB Security Conference 2020 in Amsterdam, we talked to Jon Callas, a world-renowned cryptographer, software engineer, UX designer, and …
Digital certificates still cause unplanned downtime and application outages
51% of enterprises claim low ability to detect and respond to digital certificate and key misuse, according to Keyfactor and the Ponemon Institute. “Connectivity and the …
Featured news
Sponsored
Don't miss
- How attackers deliver malware to Foxit PDF Reader users
- Core security measures to strengthen privacy and data protection programs
- Ransomware statistics that reveal alarming rate of cyber extortion
- Key questions to ask when tailoring defensive stacks
- May 2024 Patch Tuesday: Microsoft fixes exploited zero-days (CVE-2024-30051, CVE-2024-30040)