encryption

40% of organizations suffered a cloud-based data breach in the past 12 months
Despite increasing cyberattacks targeting data in the cloud, 83% of businesses are still failing to encrypt half of the sensitive data they store in the cloud, raising even …

WFH is here to stay: Five tactics to improve security for remote teams
When the pandemic took hold, most companies were forced to turn their employees into a fully operational remote workforce within the span of one week. And while some …

Add a new dimension to ransomware defenses
Ransomware is a particularly heartless endeavor. Criminals have targeted schools, vital infrastructure, and even patient records at a psychiatric treatment facility. The US …

The biggest problem with ransomware is not encryption, but credentials
With each passing day, the threat of ransomware increases in frequency, sophistication, and effectiveness. What started as a simple annoyance scheme to collect a ransom has …

Creepy data collection and sharing remain common on popular apps
In a recent Mozilla review of the privacy features of 21 popular video call apps, only two were singled out for outstanding features (Signal and Threema). Meanwhile, three …

Only 30% of enterprises use cloud services with E2E encryption for external file sharing
A recent study of enterprise IT security decision makers conducted by Tresorit shows that majority of enterprises use additional encryption methods to boost the security of …

OpenSSL 3.0: A new FIPS module, new algorithms, support for Linux Kernel TLS, and more
The OpenSSL Project has released OpenSSL 3.0, a major new stable version of the popular and widely used cryptography library. What is OpenSSL? OpenSSL contain an open-source …

3 ways to protect yourself from cyberattacks in the midst of an IT security skill shortage
With COVID-19 variants on the rise, widespread remote work may be sticking around longer than IT leaders would like, which comes with a heightened risk for cyberattacks that …

How do I select a hardware security module for my business?
Protecting your data has never been more important, and the best way to do it is by using encryption keys. These keys should then be stored inside a hardware security module …

How to make email safe for business
When it comes to business communication, email is still king. Cybercriminals are aware of this fact, and they’re constantly perfecting their attacks to successfully …

Three reasons why ransomware recovery requires packet data
Data from SonicWall’s 2021 Cyber Threat Report showed more ransomware attacks in the first half of 2021 than in all of 2020. Much of the recent conversation around ransomware …

If encryption is so good at protecting data, why do so many businesses succumb to cyberattacks?
Cybercriminals use increasingly complex deception methods, and cybersecurity can be unfamiliar, unintuitive, or inconvenient to operate, recent Mimecast research reveals. No …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility