A crypto agility plan can help minimize panic and chaos should the need arise to quickly switch encryption algorithms.
Quantum computing is here, and organizations must embrace new and evolving standards and methods of cryptography to protect their data from the emerging threat of quantum attacks.
For the enterprise responsible for protecting customers' PII, should passwords be stored at all — even encrypted?
Companies are implementing encryption, but most defenses remain piecemeal. How can security leaders improve protection without sacrificing performance?
When evaluating cloud providers, it's important to understand who is responsible for cloud security. Since the lines are often blurred, encryption is imperative to keep your data from prying eyes.
In a world where technology and culture are one and the same, public-interest technologists are critical to a better future.
Chief information security officers (CISOs) are looking for ways to set the tone for the year and have more engaged conversations with top leadership regarding cybersecurity risks.
There is no single answer to the question of how to best use data encryption. Depending on their application and data types, organizations will likely need to apply different architectural patterns.
Organizations that act now to upgrade to quantum-safe cryptography will be better positioned to reap the benefits of this emerging technology in the coming decades.
At the RSA Conference 2018, speakers touched on topics such as the IoT, blockchain and cryptography and stoked meaningful conversations about diversity and other pressing issues in cybersecurity.