There is no single answer to the question of how to best use data encryption. Depending on their application and data types, organizations will likely need to apply different architectural patterns.
A ransomware-as-a-service program called FilesLocker offers affiliates commissions of up to 75 percent on all revenue stolen from victims.
Less than two weeks after its initial detection, STOP ransomware variant KeyPass has infected devices across 20 countries, according to security researchers.
New ransomware attacks from GandCrab suggest that the authors are moving quickly to improve its ability to evade detection and impede analysis by security researchers.
Organizations looking to invest in enterprise blockchains to unify and secure transactions and data records should do their homework before trusting a vendor with their most sensitive information.
Despite the risks quantum computing might pose to organizations, this emerging technology also promises to enhance cybersecurity capabilities such as SIEM, incident response and data protection.
Object stores are inexpensive and scalable, but how can you be sure your CSP will properly handle your encryption keys? How can you maintain the flexibility to switch CSPs if necessary?
Quantum computing will introduce new risks in the coming decades, but it also has the potential to revolutionize the way organizations safeguard business-critical and personal data.
The only way to reduce the encryption blast radius is to keep moving forward and embrace the advancements the technology has undergone over the years.
Security researchers uncovered two new ransomware strains that use open source tools to minimize their victims' odds of recovering their encrypted files.