The concept of "identity is the perimeter" is not new. However, COVID-19 has accelerated the transformation of workforce identity management, forcing organizations to navigate a new reality sooner than expected.
Whether or not they were prepared for it, more organizations are working remotely and utilizing SaaS...
Healthcare provider organizations, pharmaceutical companies and medical device manufacturers all must take critical security steps to avoid becoming victims of data breaches during the COVID-19 pandemic, says technology attorney and former physicist Phil Crowley.
In mere weeks, the healthcare industry was able to leapfrog ahead years in its digital transformation. But at a price to data security, which now faces new kinds of exposure. Zettaset CEO Tim Reilly discusses these vulnerabilities and the future of encryption in the healthcare sector.
Federal agencies will add a layer of security to their websites that use the top-level domain .gov. All the sites eventually will use the HSTS protocol, which ensures that a user's connection to a website is encrypted and can protect against man-in-the middle attacks and cookie hijacking.
Zoom will begin beta testing an end-to-end encryption feature in July that it plans to make available at no charge to all who use the paid or free version of its teleconference platform. It's also rolling out other new security features.
Increasingly, organizations are turning to encryption to help solve multiple security issues, whether it's protecting data, managing risk or meeting government regulations. While managing all these encryption keys can be complex, Brad Beutlich of nCiper Security doesn't believe it has to be this way.
To date, most organisations have had hard boundaries between system administrators and their software development teams, where they occasionally interact, rarely coordinate, and never collaborate. As the needs for collaboration between IT administrators and software developers - both internal and external - continue...
As digital transformation technologies such as containers and connected devices are changing business models, organizations are finding new ways to secure data with encryption. John Grimm of nCipher Security walks through how the use cases for encryption are keeping up with the times.
Ransomware gangs keep innovating: Maze has begun leaking data on behalf of both Lockbit and RagnarLocker, while REvil has started auctioning data - from victims who don't meet its ransom demands - to the highest bidder. Thankfully, security experts continue to release free decryptors for some strains.
For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don't understand...
Phishing scams continue to be a leading cause of health data breaches so far this year. But the theft of unencrypted laptops led to the biggest breach reported in 2020, and an insider breach involving a physician exposed data on thousands of patients.
What good is securing your data if the bad guys have already stolen your encryption keys? Brad Beutlich of nCipher Security sets the record straight about encryption and why some cryptography myths persist.
Zoom has reached a settlement with the New York state attorney general's office to provide better security and privacy controls for its videoconferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company.
With ransomware attacks and data breaches on the rise, it is critical that today's business leaders take action to ensure that their most critical data is protected. Data encryption should be the first and last line of defense - encoding your sensitive data and rendering it unusable in the event of a data...