Fraud Protection March 14, 2017 Enterprise Intelligence Brief: Three Experts Discuss Blockchain in Cybersecurity 5 min read - Blockchain has the potential to revolutionize the way businesses conduct financial transactions in the next few years, according to security experts.
March 9, 2017 SGX Malware Extracts RSA Key in Five Minutes 2 min read - Researchers at Graz University of Technology in Austria developed a novel SGX malware attack that can extract an RSA key in under five minutes.
March 6, 2017 Android Users Must Stay Alert to New Security Flaw 2 min read - A new security flaw and fresh concerns about malware provide further evidence of the need for Android users to remain diligent to external risks.
Data Protection February 28, 2017 How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability 4 min read - It's critical to protect sensitive cloud-based data using encryption while it is being stored, and to delete it securely at the end of its life cycle.
February 28, 2017 End-to-End Email Encryption: Google Pushes Latest Project to Open Source 2 min read - Google just pushed its email encryption project, E2EMail, to open source. What does this mean for the development of corporate email security?
Endpoint February 24, 2017 Making the Move to an All-HTTPS Network 2 min read - There are countless benefits to moving web infrastructure to support the HTTPS protocol, but it's not as simple as swapping one protocol for another.
February 22, 2017 PHP Will Incorporate Libsodium for Crypto 2 min read - Starting with the release of version 7.2 at the end of this year, the core of PHP will use Libsodium by default for routine cryptographical operations.
Application Security February 8, 2017 A Primer on IoT Security Risks 4 min read - IoT security risks include physical, network, software and encryption attacks that target the sensor, network and application layers of IoT systems.
January 30, 2017 New VirLocker Ransomware Is Easily Fooled 2 min read - Researchers discovered a particularly malicious new strain of the VirLocker ransomware that can be tricked into thinking a ransom has been paid.
Data Protection January 18, 2017 Applying the Principles of Quantum Entanglement to Secure Communication 3 min read - When applied to data security, the principles of quantum mechanics — namely, the theory of quantum entanglement — hold the potential to facilitate secure communication and prevent eavesdropping.