Blockchain: Making the Reward Much Greater Than the Risk

The decentralized nature of blockchain, coupled with consensus protocols, helps to address some security needs, but the consequences can be dire if security isn’t fully explored.

The post Blockchain: Making the Reward Much Greater Than the Risk appeared first on Security Intelligence.

Continue reading Blockchain: Making the Reward Much Greater Than the Risk

Lessons from the Encryption Front Line: Core Components in the Cloud

Depending on your needs, you can develop encryption solutions based on open standards from components you build and run yourself or source them as managed services from cloud providers.

The post Lessons from the Encryption Front Line: Core Components in the Cloud appeared first on Security Intelligence.

Continue reading Lessons from the Encryption Front Line: Core Components in the Cloud

Moving to the Hybrid Cloud? Make Sure It’s Secure by Design

Failure to consider security when developing a hybrid cloud can lead to unanticipated problems that don’t exist in typical technology infrastructure.

The post Moving to the Hybrid Cloud? Make Sure It’s Secure by Design appeared first on Security Intelligence.

Continue reading Moving to the Hybrid Cloud? Make Sure It’s Secure by Design

Lessons From the Data Encryption Front Line: Understanding Common Threats

There is no single answer to the question of how to best use data encryption. Depending on their application and data types, organizations will likely need to apply different architectural patterns.

The post Lessons From the Data Encryption Front Line: Understanding Common Threats appeared first on Security Intelligence.

Continue reading Lessons From the Data Encryption Front Line: Understanding Common Threats

Why You Should Do Your Homework Before Investing in Enterprise Blockchains

Organizations looking to invest in enterprise blockchains to unify and secure transactions and data records should do their homework before trusting a vendor with their most sensitive information.

The post Why You Should Do Your Homework Before Investing in Enterprise Blockchains appeared first on Security Intelligence.

Continue reading Why You Should Do Your Homework Before Investing in Enterprise Blockchains

Quantum Leaps and Bounds: Why Quantum Computing Will Have a Positive Impact on Cybersecurity

Despite the risks quantum computing might pose to organizations, this emerging technology also promises to enhance cybersecurity capabilities such as SIEM, incident response and data protection.

The post Quantum Leaps and Bounds: Why Quantum Computing Will Have a Positive Impact on Cybersecurity appeared first on Security Intelligence.

Continue reading Quantum Leaps and Bounds: Why Quantum Computing Will Have a Positive Impact on Cybersecurity

When Nobody Controls Your Object Stores — Except You

Object stores are inexpensive and scalable, but how can you be sure your CSP will properly handle your encryption keys? How can you maintain the flexibility to switch CSPs if necessary?

The post When Nobody Controls Your Object Stores — Except You appeared first on Security Intelligence.

Continue reading When Nobody Controls Your Object Stores — Except You

Quantum Computing and Cryptography: What You Need to Know

Quantum computing will introduce new risks in the coming decades, but it also has the potential to revolutionize the way organizations safeguard business-critical and personal data.

The post Quantum Computing and Cryptography: What You Need to Know appeared first on Security Intelligence.

Continue reading Quantum Computing and Cryptography: What You Need to Know