Chief information security officers (CISOs) are looking for ways to set the tone for the year and have more engaged conversations with top leadership regarding cybersecurity risks.
There is no single answer to the question of how to best use data encryption. Depending on their application and data types, organizations will likely need to apply different architectural patterns.
Organizations that act now to upgrade to quantum-safe cryptography will be better positioned to reap the benefits of this emerging technology in the coming decades.
At the RSA Conference 2018, speakers touched on topics such as the IoT, blockchain and cryptography and stoked meaningful conversations about diversity and other pressing issues in cybersecurity.
There's something for every cybersecurity enthusiast at this year's RSA Conference, including masterful keynotes, stirring panels and vendor showcases featuring the latest technologies in the field.
The latest version of the PHP programming language provides support for improved password hashing and high-speed cryptography.
Security researchers exposed a vulnerability in a random number generator with hardcoded keys that could lead to a crypto attack.
Blockchain technology depends on mutual trust between human participants, each of whom represents a potential weakness in the chain.
Cryptocurrencies such as bitcoin are becoming more popular, but that means cybercriminals are embracing the potential of cryptocurrency as well.
Data encryption is one of the most basic — and, given the right tools, most effective — ways to protect sensitive information from cybercriminals.