The Importance of Modern-Day Data Security Platforms

Data is the backbone of businesses and companies everywhere. Data can range from intellectual property to critical business plans to personal health information or even money itself. At the end of the day, businesses are looking to grow revenue, innovate, and operationalize but to do that, they must ensure that they leverage their data first […]

The post The Importance of Modern-Day Data Security Platforms appeared first on Security Intelligence.

Continue reading The Importance of Modern-Day Data Security Platforms

1Password is looking to a password-free future. Here’s why

With phishing-based credentials theft on the rise, 1Password CPO Steve Won explains why the endgame is to ‘eliminate’ passwords entirely.
The post 1Password is looking to a password-free future. Here’s why appeared first on TechRepublic.
Continue reading 1Password is looking to a password-free future. Here’s why

What You Need to Know About Data Encryption Right Now

You might feel like you’ve heard these imperatives a million times: “You need to encrypt your data.” “Your information isn’t secure unless you encrypt it.” “You need to eat your fruits and vegetables.” But if you’re like a lot of people, you roll your eyes because you have the good intention of taking care of […]

The post What You Need to Know About Data Encryption Right Now appeared first on Security Intelligence.

Continue reading What You Need to Know About Data Encryption Right Now

Data Protection: What Needs to Be Protected?

Where is your organization’s data? From global data centers to PCs to mobile apps, data is strewn all over the place. So how do you protect it all?  You can’t encrypt everything, right? It’s too expensive and time-consuming. Even the most stringent regulations don’t demand that level of data protection. For example, GDPR focuses primarily […]

The post Data Protection: What Needs to Be Protected? appeared first on Security Intelligence.

Continue reading Data Protection: What Needs to Be Protected?

Data Encryption: Simplifying Enterprise Key Management

Data encryption can help prevent malicious users and rogue processes from taking control of sensitive data. According to the 2021 Cost of a Data Breach report, the use of encryption is a top factor in reducing the average data breach cost. But, encrypted data is only as safe as the encryption keys. The IT or security teams […]

The post Data Encryption: Simplifying Enterprise Key Management appeared first on Security Intelligence.

Continue reading Data Encryption: Simplifying Enterprise Key Management

Crypto-Risk: Your Data Security Blind Spot

Start thinking about what your organization can do to manage crypto-risk before today’s encryption and security measures fall prey to tomorrow’s attackers and advanced computing tools.

The post Crypto-Risk: Your Data Security Blind Spot appeared first on Security Intelligence.

Continue reading Crypto-Risk: Your Data Security Blind Spot

Researchers Discover TPM-Fail Vulnerabilities Affecting Billions of Devices

A team of cybersecurity researchers today disclosed details of two new potentially serious CPU vulnerabilities that could allow attackers to retrieve cryptographic keys protected inside TPM chips manufactured by STMicroelectronics or firmware-based Int… Continue reading Researchers Discover TPM-Fail Vulnerabilities Affecting Billions of Devices

NordVPN Breach FAQ – What Happened and What’s At Stake?

NordVPN, one of the most popular and widely used VPN services out there, yesterday disclosed details of a security incident that apparently compromised one of its thousands of servers based in Finland.

Earlier this week, a security researcher on Twitt… Continue reading NordVPN Breach FAQ – What Happened and What’s At Stake?

How to Make Cryptography Services Work for Your Organization

Organizations consider certificate management and key management a commodity, and many seem to struggle to get this right. However, there’s more to cryptography than encryption, keys and certificates.

The post How to Make Cryptography Services Work for Your Organization appeared first on Security Intelligence.

Continue reading How to Make Cryptography Services Work for Your Organization