How Employing Encryption for Data Security Changed History

Human history is full of examples of encryption playing pivotal roles in war, competition and transitions of power. Throughout recorded time, people have employed encryption as a tactical tool to keep information private. That data could involve military campaigns, plots to overthrow political leaders or political dealings. In some cases, the use of encryption actually resulted […]

The post How Employing Encryption for Data Security Changed History appeared first on Security Intelligence.

Continue reading How Employing Encryption for Data Security Changed History

Future-Proofing Data With a Data Encryption Plan

Data volume storage needs are growing exponentially across hybrid multicloud environments. Meanwhile, companies are being faced with a greater number of regulations to follow, as well as increased exposure to data ransomware, theft and misuse. Many regulations, such as the General Data Protection Regulation, highlight encryption as an example of appropriate technical and organizational measures. While not […]

The post Future-Proofing Data With a Data Encryption Plan appeared first on Security Intelligence.

Continue reading Future-Proofing Data With a Data Encryption Plan

Lessons Learned from 2019’s Biggest Data Breaches

With more than 5,000 data breaches and over 7 billion records exposed, 2019 was the worst year on record for breach activity. According to research from Risk Based Security, the number of data breaches within just the first nine months of 2019 increas… Continue reading Lessons Learned from 2019’s Biggest Data Breaches

IBM Adds Encryption Everywhere Capabilities to the Mainframe

IBM today unveiled a z15 mainframe that takes advantage of additional processing horsepower to create Trusted Data Objects that allow organizations to employ Privacy Passports technology to encrypt data across a hybrid cloud computing environment. Tru… Continue reading IBM Adds Encryption Everywhere Capabilities to the Mainframe

MongoDB 4.2 Introduces End-to-End Field Level Encryption for Databases

At its developer conference held earlier this week in New York, the MongoDB team announced the latest version of its database management software that includes a variety of advanced features, including Field Level Encryption, Distributed Transactions, … Continue reading MongoDB 4.2 Introduces End-to-End Field Level Encryption for Databases

North Carolina’s Orange County Hit by Third Ransomware Attack in Six Years

Orange County in North Carolina suffered its third ransomware infection in six years, the local government announced on its website on Monday. The attack, probably stemming from a phishing email, a very common practice in such situations, crippled the … Continue reading North Carolina’s Orange County Hit by Third Ransomware Attack in Six Years

Google Created Faster Storage Encryption for All Low-End Devices

Google has launched a new encryption algorithm that has been built specifically to run on mobile phones and smart IoT devices that don’t have the specialized hardware to use current encryption methods to encrypt locally stored data efficiently.

Encryp… Continue reading Google Created Faster Storage Encryption for All Low-End Devices