As homomorphic encryption gains steam, experts search for standards

Encryption has always been a battle line in cyberspace. Attackers try to break it; defenders reinforce it. The next front in that struggle is something known as homomorphic encryption, which scrambles data not just when it is at rest or in transit, but when it is being used. The idea is to not have to decrypt sensitive financial or healthcare data, for example, in order to run computations with it. Defenders are trying to get ahead of attackers by locking down data wherever it lies. The latest step in homomorphic encryption’s decade-long journey from dream to adoption was a standards meeting over the weekend of representatives from Google, Intel, and Microsoft, along with academics from around the world. While previous meetings focused on the specifics of algorithms, this fourth meeting included more talk of pursuing homomorphic encryption standards at a handful of global bodies, according to Intel’s Casimir Wierzynski, who […]

The post As homomorphic encryption gains steam, experts search for standards appeared first on CyberScoop.

Continue reading As homomorphic encryption gains steam, experts search for standards

Is Staff Burnout the Best Reason to Implement Cybersecurity AI?

Reading Time: 4 minutes Staff burnout in the cybersecurity industry is at worrisome levels. With more data production and next-generation technology around the corner, now may be the best time to implement cybersecurity AI.

The post Is Staff Burnout the Best Reason to Implement Cybersecurity AI? appeared first on Security Intelligence.

Continue reading Is Staff Burnout the Best Reason to Implement Cybersecurity AI?

UEM’s Sophomore Year: ‘2019 Gartner Magic Quadrant for Unified Endpoint Management Tools’

Reading Time: 4 minutes IBM was named a Leader in the “2019 Gartner Magic Quadrant for Unified Endpoint Management” for its ability to execute and lead the entire field of vendors in its completeness of vision.

The post UEM’s Sophomore Year: ‘2019 Gartner Magic Quadrant for Unified Endpoint Management Tools’ appeared first on Security Intelligence.

Continue reading UEM’s Sophomore Year: ‘2019 Gartner Magic Quadrant for Unified Endpoint Management Tools’

5G Technology Is Coming, But Is It Already Filled With Security Flaws?

Reading Time: 3 minutes There is a lot to be excited about with 5G technology, but it will also open more doors for threat actors to get into networks, making it more difficult to effectively protect endpoints and data.

The post 5G Technology Is Coming, But Is It Already Filled With Security Flaws? appeared first on Security Intelligence.

Continue reading 5G Technology Is Coming, But Is It Already Filled With Security Flaws?

What Would You Trust to Protect Your Business: Humans or Cybersecurity AI?

Reading Time: 5 minutes According to a recent study from Palo Alto Networks and YouGov, some of us have more trust in cybersecurity AI than we do humans when it comes to managing security.

The post What Would You Trust to Protect Your Business: Humans or Cybersecurity AI? appeared first on Security Intelligence.

Continue reading What Would You Trust to Protect Your Business: Humans or Cybersecurity AI?

What Is Data Protection and Why Does It Matter?

Reading Time: 4 minutes Data protection, when done right, can help drive digital transformation and business growth. How can enterprises deliver consistent, proactive and intelligent data control while enabling innovation?

The post What Is Data Protection and Why Does It Matter? appeared first on Security Intelligence.

Continue reading What Is Data Protection and Why Does It Matter?

4 Questions CISOs Need to Ask About Enterprise Cybersecurity

Reading Time: 4 minutes It’s not always easy to ask the hard questions about enterprise cybersecurity. Here are four questions that CISOs need to answer to boost infosec impact.

The post 4 Questions CISOs Need to Ask About Enterprise Cybersecurity appeared first on Security Intelligence.

Continue reading 4 Questions CISOs Need to Ask About Enterprise Cybersecurity

Gartner Releases 2019 Market Guide for SOAR Solutions

Reading Time: 3 minutes In its new market guide for security orchestration and automation, Gartner predicted, “By year-end 2022, 30% of organizations with a security team larger than five people will leverage SOAR tools.”

The post Gartner Releases 2019 Market Guide for SOAR Solutions appeared first on Security Intelligence.

Continue reading Gartner Releases 2019 Market Guide for SOAR Solutions

Facing the Promise and Peril of Facial Recognition for Authentication

Reading Time: 6 minutes Great security depends on the ability to know who is authorized and who is not. This applies to both physical and digital security. But how? Increasingly, one answer is facial recognition.

The post Facing the Promise and Peril of Facial Recognition for Authentication appeared first on Security Intelligence.

Continue reading Facing the Promise and Peril of Facial Recognition for Authentication

This Is What Experts Say Will Turn the Tide Against Increasing Cyberthreats

Most organizations could blunt the vast majority of cyberthreats by making better use of the tools they already have and protecting their most precious data.

The post This Is What Experts Say Will Turn the Tide Against Increasing Cyberthreats appeared first on Security Intelligence.

Continue reading This Is What Experts Say Will Turn the Tide Against Increasing Cyberthreats