When evaluating cloud providers, it's important to understand who is responsible for cloud security. Since the lines are often blurred, encryption is imperative to keep your data from prying eyes.
In a world where technology and culture are one and the same, public-interest technologists are critical to a better future.
Chief information security officers (CISOs) are looking for ways to set the tone for the year and have more engaged conversations with top leadership regarding cybersecurity risks.
There is no single answer to the question of how to best use data encryption. Depending on their application and data types, organizations will likely need to apply different architectural patterns.
Organizations that act now to upgrade to quantum-safe cryptography will be better positioned to reap the benefits of this emerging technology in the coming decades.
At the RSA Conference 2018, speakers touched on topics such as the IoT, blockchain and cryptography and stoked meaningful conversations about diversity and other pressing issues in cybersecurity.
There's something for every cybersecurity enthusiast at this year's RSA Conference, including masterful keynotes, stirring panels and vendor showcases featuring the latest technologies in the field.
The latest version of the PHP programming language provides support for improved password hashing and high-speed cryptography.
Security researchers exposed a vulnerability in a random number generator with hardcoded keys that could lead to a crypto attack.
Blockchain technology depends on mutual trust between human participants, each of whom represents a potential weakness in the chain.