encryption
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092903/lock-blue-400x200.jpg)
Overcoming crypto assessment challenges to improve quantum readiness
Large enterprises have a major problem when it comes to preparing for the advent of quantum computing: few, if any, have a working knowledge of all the locations where …
![password managers](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095212/password-managers-400x200.jpg)
Some commercial password managers vulnerable to attack by fake apps
Security experts recommend using a complex, random and unique password for every online account, but remembering them all would be a challenging task. That’s where …
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103714/binary-400x200.jpg)
Mixed-signal circuits can stop side-channel attacks against IoT devices
Purdue University innovators have unveiled technology that is 100 times more resilient to electromagnetic and power attacks, to stop side-channel attacks against IoT devices. …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093250/lock-400x200.jpg)
Jon Callas: Encryption is a technology that rearranges power
In anticipation of his keynote at HITB Security Conference 2020 in Amsterdam, we talked to Jon Callas, a world-renowned cryptographer, software engineer, UX designer, and …
![certificate](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101804/certificate-400x200.jpg)
Digital certificates still cause unplanned downtime and application outages
51% of enterprises claim low ability to detect and respond to digital certificate and key misuse, according to Keyfactor and the Ponemon Institute. “Connectivity and the …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/09173929/network-blue-400x200.jpg)
The future of DNS security: From extremes to a new equilibrium
In anticipation of his keynote at HITB Security Conference 2020 in Amsterdam, we talked to internet pioneer Dr. Paul Vixie, Farsight Security Chairman and CEO. Dr. Vixie was …
![vectors](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103046/vectors-400x200.jpeg)
Malware and ransomware attack volume down due to more targeted attacks
Cybercriminals are leveraging more evasive methods to target businesses and consumers, a SonicWall report reveals. “Cybercriminals are honing their ability to design, …
![vote](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111919/vote-400x200.jpg)
Lack of .GOV validation and HTTPS leaves states susceptible to voter disinformation campaigns
There’s a severe lack of U.S. government .GOV validation and HTTPS encryption among county election websites in 13 states projected to be critical in the 2020 U.S. …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/02112425/vault-pattern2-400x200.jpg)
Three principles regarding encryption you need to keep in mind
Encryption is a popular topic among security professionals and occasionally a polarizing one. Plenty of misconceptions surround the process, and these often skew the way …
![Network](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102932/network-bot-400x200.jpg)
Interconnectivity and networking predictions for 2020 and beyond
Traditional networking and interconnectivity approaches are not handling the pressures being placed on traditional computer networking, according to Stateless. The challenges …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/29153125/encryption-1-400x200.jpg)
Researchers develop new optical stealth encryption technology
The first all optical stealth encryption technology that will be significantly more secure and private for highly sensitive cloud-computing and data center network …
![Apple privacy](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/09092722/apple-privacy-400x200.jpg)
Did Apple drop end-to-end encrypted iCloud backups because of the FBI?
Two years ago, Apple abandoned its plan to encrypt iPhone backups in the iCloud in such a way that makes it impossible for it (or law enforcement) to decrypt the contents, a …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints