Artificial Intelligence September 16, 2016 Quantum Computing Is Coming for Your Current Crypto 5 min read - Quantum computing promises to overhaul the information security industry. How can security teams compete with machines capable of decoding any encryption?
September 8, 2016 Crypto Keys Conundrum: For InfoSec, Sharing Isn’t Caring 2 min read - SEC Consult found that sharing of nonunique crypto keys is up 40 percent over the last nine months, putting 4.5 million devices at risk.
August 9, 2016 Cerber’s New Variant Evades Ransomware Decryption 2 min read - Cerber ransomware's authors updated to a new variant by messing around with the ransomware decryption used in their criminal efforts.
August 8, 2016 Cookie Encryption Does Not Always Happen, Researchers Find 2 min read - An HTTPS connection may reduce the attack surface of a browser, but it really doesn't help if the website doesn't use cookie encryption.
July 6, 2016 Android Encryption Fails Thanks to Qualcomm Chips 2 min read - A security researcher discovered that the Qualcomm-made chips at the center of Android encryption can be exploited in a sophisticated attack.
June 30, 2016 Latest Ponemon Study Reveals More Enterprises Embracing an Encryption Strategy 2 min read - A recent survey from the Ponemon Institute detailed how organizations across industries are embracing an encryption strategy to protect critical data.
Data Protection June 24, 2016 Can You Still Protect Your Most Sensitive Data? 3 min read - Companies in Silicon Valley and beyond are questioning how they should be protecting their sensitive data — if they choose to keep it at all.
June 20, 2016 Apple Wants HTTPS for Apps by 2017 2 min read - At its latest Worldwide Developers Conference, Apple announced that HTTPS for apps will be mandatory starting in January 2017.
Data Protection June 20, 2016 GDPR: How to Prepare in the Calm Before the Storm 3 min read - The General Data Protection Regulation (GDPR) has finally arrived in the EU. Here's what organizations around the world can do to be prepared.
May 24, 2016 New Method for Random Number Generation Devised at UT Austin 2 min read - A breakthrough in random number generation has the potential to result in stronger encryption— and, ultimately, improved cybersecurity.