Cybertech NYC 2022 video walkthrough

Help Net Security is in New York City this week for Cybertech NYC 2022 at the Javits Center. This event, which focuses on innovation and the future of cyber, brings together prominent cyber leaders, both from the New York City cyber ecosystem and aroun… Continue reading Cybertech NYC 2022 video walkthrough

Why companies can no longer hide keys under the doormat

For good reason, companies trust in encryption, blockchain, zero trust access, distributed or multi-party strategies, and other core technologies. At the same time, companies are effectively hiding the keys that could undermine all these protections un… Continue reading Why companies can no longer hide keys under the doormat

How to eliminate the weak link in public cloud-based multi-party computation

Secure multi-party computation (MPC) has seen steady evolution to tackle many scientific challenges. These include enabling the creation and tuning of AI or machine learning algorithms, as well as developing open-source software and games. Now, digital… Continue reading How to eliminate the weak link in public cloud-based multi-party computation

Parfin selects Anjuna Security to protect MPC custody assets against risk and misuse

Anjuna Security and Parfin announced that the Anjuna Confidential Cloud Software solution now enables Parfin’s MPC Custody platform to utilize the highly secure hardware protection of AWS Nitro Enclaves without any changes to applications or processes…. Continue reading Parfin selects Anjuna Security to protect MPC custody assets against risk and misuse

Anjuna Security expands executive team with four industry executives

Anjuna Security announced it is accelerating its go-to-market capabilities in the fast-emerging confidential computing market with the arrival of four seasoned industry executives. Former Zscaler executive Manoj Apte has joined the company’s Board of D… Continue reading Anjuna Security expands executive team with four industry executives

From fragmented encryption chaos to uniform data protection

Encryption is so critical to enterprise security that it’s almost like air: It’s a necessity, it’s everywhere, and we can’t live without it. On the surface, having encryption everywhere seems like a great idea. However, in many ways the drive to achiev… Continue reading From fragmented encryption chaos to uniform data protection

Can the public cloud become confidential?

It’s been often said that the only two certain things in life are death and taxes. Over the past ten years, it seems data breaches can be added to this list. Can an organization really be completely safe – without fear of losing confidential or r… Continue reading Can the public cloud become confidential?

The next big thing in cloud computing? Shh… It’s confidential

The business-driven explosion of demand for cloud-based services has made the need to provide highly secure cloud computing more urgent. Many businesses that work with sensitive data view the transition to the cloud with trepidation, which is not entir… Continue reading The next big thing in cloud computing? Shh… It’s confidential

Runtime data no longer has to be vulnerable data

Today, the security model utilized by nearly all organizations is so weak that the mere act of creating new data comes with the immutable assumption that such data will become public and subject to theft or misuse. The issues related to data access The… Continue reading Runtime data no longer has to be vulnerable data