68% of IT leaders are worried about API sprawl

Axway announced new data from its inaugural 2022 Open Everything Strategy Survey Report, which found that nearly 40% of organizations are in the process of adopting a new hybrid approach for their IT infrastructure. The transformation comes as 68% of r… Continue reading 68% of IT leaders are worried about API sprawl

Don’t ignore the security risks of limitless cloud data

Over the past two decades, technology has evolved to make it easy and affordable for companies to collect, store and use massive amounts of data. From AWS to Google Cloud to Snowflake, even startups and small businesses can quickly establish a mature d… Continue reading Don’t ignore the security risks of limitless cloud data

Transitioning to Quantum-Safe Encryption

With their vast increase in computing power, quantum computers promise to revolutionize many fields. Artificial intelligence, medicine and space exploration all benefit from this technological leap — but that power is also a double-edged sword. The risk is that threat actors could abuse quantum computers to break the key cryptographic algorithms we depend upon for […]

The post Transitioning to Quantum-Safe Encryption appeared first on Security Intelligence.

Continue reading Transitioning to Quantum-Safe Encryption

Ravi Pendekanti: How Western Digital’s HDD innovation is lowering total cost of ownership

In a recent interview with Ravi Pendekanti, SVP of Product Management & Marketing at Western Digital, he explained how they have expanded their HDD technology to lower total cost of ownership.
The post Ravi Pendekanti: How Western Digital’s HDD i… Continue reading Ravi Pendekanti: How Western Digital’s HDD innovation is lowering total cost of ownership

Breaking down data encryption techniques aimed at improving data privacy

In this Help Net Security video, Dana Morris, SVP Product and Engineering at Virtru, talks about privacy-preserving cryptography. He provides an introduction to data encryption techniques, the key exchange problem, discusses the need for crypto-agility… Continue reading Breaking down data encryption techniques aimed at improving data privacy

2FA, 3FA, MFA… What does it all mean?

Simply put, authentication is the act of proving you are who you say you are. To gain access to protected information, systems or locations, the user must prove their identity by providing specific access credentials. The system asks: “Who are you? Pro… Continue reading 2FA, 3FA, MFA… What does it all mean?

The security dilemma of data sprawl

As hybrid work becomes the norm in business, so does data sprawl. Data sprawl refers to the spread of company information to various places, which often comes from dispersed and unmanaged cloud app use. In fact, within businesses worldwide, 1 in 5 empl… Continue reading The security dilemma of data sprawl

Privacy, compliance challenges businesses face after Roe v. Wade repeal

In this Help Net Security video, Rebecca Herold, IEEE member and CEO of Privacy & Security Brainiacs, discusses data, privacy, surveillance, and compliance challenges facing businesses in the wake of the US Supreme Court’s repeal of the Roe … Continue reading Privacy, compliance challenges businesses face after Roe v. Wade repeal

What consumers expect from organizations that handle their personal data

In this Help Net Security video, Robert Waitman, Privacy Director and Head of Privacy Research Program at Cisco, discusses the key findings of Cisco’s 2022 Consumer Privacy Survey. This year’s survey highlights the critical need for further trans… Continue reading What consumers expect from organizations that handle their personal data