The latest version of the PHP programming language provides support for improved password hashing and high-speed cryptography.
Security researchers uncovered two new ransomware strains that use open source tools to minimize their victims' odds of recovering their encrypted files.
A new variant of the Crysis ransomware highlights the need for companies to enhance their ransomware protection.
Before diving head-first into a data storage and encryption strategy, the CISO must decide which solutions best address the organization's unique needs.
Symmetric key encryption, password hashing and SHA-1 are all ineffective ways to store passwords during the software development stage.
Pervasive encryption is a powerful, customizable feature of the IBM z14 mainframe that enables security teams to protect all data and maintain compliance.
Security researchers exposed a vulnerability in a random number generator with hardcoded keys that could lead to a crypto attack.
Researchers found that TPM chipsets manufactured by Infineon create weak RSA key information, which could enable fraudsters to compromise corporate data.
Fail-safe measures such as encryption can help organizations minimize cloud and third-party risks in the virtually inevitable event of a data breach.
The latest version of Guardium Data Encryption allows many different types of organizations to protect data by making the data less accessible.