Object stores are inexpensive and scalable, but how can you be sure your CSP will properly handle your encryption keys? How can you maintain the flexibility to switch CSPs if necessary?
Quantum computing will introduce new risks in the coming decades, but it also has the potential to revolutionize the way organizations safeguard business-critical and personal data.
The only way to reduce the encryption blast radius is to keep moving forward and embrace the advancements the technology has undergone over the years.
Security researchers uncovered two new ransomware strains that use open source tools to minimize their victims' odds of recovering their encrypted files.
Before diving head-first into a data storage and encryption strategy, the CISO must decide which solutions best address the organization's unique needs.
Symmetric key encryption, password hashing and SHA-1 are all ineffective ways to store passwords during the software development stage.
Pervasive encryption is a powerful, customizable feature of the IBM z14 mainframe that enables security teams to protect all data and maintain compliance.
Security researchers exposed a vulnerability in a random number generator with hardcoded keys that could lead to a crypto attack.
Blockchain technology depends on mutual trust between human participants, each of whom represents a potential weakness in the chain.
Researchers found that TPM chipsets manufactured by Infineon create weak RSA key information, which could enable fraudsters to compromise corporate data.