encryption
Understaffing persistently impacting enterprise privacy teams
A research from ISACA explores the latest trends in enterprise privacy — from privacy workforce and privacy by design to privacy challenges and the future of privacy. The …
Endpoint malware and ransomware detections hit all-time high
Endpoint malware and ransomware detections surpassed the total volume seen in 2020 by the end of Q3 2021, according to researchers at the WatchGuard Threat Lab. In its latest …
PCI SSC updates its device security standard for HSMs
The PCI SSC published the latest version of its device security standard for Hardware Security Modules (HSMs). HSMs are secure cryptographic devices that are used for …
EV certificate usage declining: Is the internet becoming more secure?
Driven by the acceleration of digital transformation and cloud migration during the pandemic, the analysis of the world’s top 1 million sites over the last 18 months shows …
Beware of ransomware attacks between Christmas and New Year’s!
Darktrace reported that its security researchers discovered a 30% increase in the average number of attempted ransomware attacks globally over the holiday season in every …
EU key management in 2022
It was reported that the private key used to sign EU Digital Covid certificates (aka “vaccine passports”) was leaked and circulated on messaging apps and online data breach …
Secure transactions top retailers’ wish lists this holiday season
We are amid the busiest retail season of the year, with U.S. retail sales expected to grow 10.5% to a record $859 billion this holiday season compared to 2020. The number of …
Acra: Open-source database protection with field-level encryption and intrusion detection
Cossack Labs updated its flagship open-source product Acra database security suite to version 0.90.0 and made many of its core security features previously available only for …
From fragmented encryption chaos to uniform data protection
Encryption is so critical to enterprise security that it’s almost like air: It’s a necessity, it’s everywhere, and we can’t live without it. On the surface, having encryption …
When it comes to securing systems against quantum computers, there is no one-size-fits-all solution
Quantum computers will rapidly solve complex mathematical problems. This includes the ability to break both RSA and ECC encryption in seconds. In response, NIST has been …
Active Directory control: How adversaries score even bigger goals via attack paths
Microsoft Active Directory and Azure Active Directory are directory services products used for identity and access management at most major enterprises all over the world. All …
40% of organizations suffered a cloud-based data breach in the past 12 months
Despite increasing cyberattacks targeting data in the cloud, 83% of businesses are still failing to encrypt half of the sensitive data they store in the cloud, raising even …
Featured news
Sponsored
Don't miss
- Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)
- Debunking compliance myths in the digital era
- How CISOs tackle business payment fraud
- AI framework vulnerability is being used to compromise enterprise servers (CVE-2023-48022)
- Attackers leverage weaponized iMessages, new phishing-as-a-service platform