Minimizing the Encryption Blast Radius

The only way to reduce the encryption blast radius is to keep moving forward and embrace the advancements the technology has undergone over the years.

The post Minimizing the Encryption Blast Radius appeared first on Security Intelligence.

Continue reading Minimizing the Encryption Blast Radius

Applying the Principles of Quantum Entanglement to Secure Communication

When applied to data security, the principles of quantum mechanics — namely, the theory of quantum entanglement — hold the potential to facilitate secure communication and prevent eavesdropping.

The post Applying the Principles of Quantum Entanglement to Secure Communication appeared first on Security Intelligence.

Continue reading Applying the Principles of Quantum Entanglement to Secure Communication

Data Storage and Encryption Should Top the CISO’s To-Do List

Before diving head-first into a data storage and encryption strategy, the CISO must decide which solutions best address the organization’s unique needs.

The post Data Storage and Encryption Should Top the CISO’s To-Do List appeared first on Security Intelligence.

Continue reading Data Storage and Encryption Should Top the CISO’s To-Do List

How Not to Store Passwords: SHA-1 Fails Again

Symmetric key encryption, password hashing and SHA-1 are all ineffective ways to store passwords during the software development stage.

The post How Not to Store Passwords: SHA-1 Fails Again appeared first on Security Intelligence.

Continue reading How Not to Store Passwords: SHA-1 Fails Again

The Power and Versatility of Pervasive Encryption

Pervasive encryption is a powerful, customizable feature of the IBM z14 mainframe that enables security teams to protect all data and maintain compliance.

The post The Power and Versatility of Pervasive Encryption appeared first on Security Intelligence.

Continue reading The Power and Versatility of Pervasive Encryption

The Blockchain Is Only as Strong as Its Weakest Link

Blockchain technology depends on mutual trust between human participants, each of whom represents a potential weakness in the chain.

The post The Blockchain Is Only as Strong as Its Weakest Link appeared first on Security Intelligence.

Continue reading The Blockchain Is Only as Strong as Its Weakest Link

DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions

DUHK — Don’t Use Hard-coded Keys — is a new ‘non-trivial’ cryptographic implementation vulnerability that could allow attackers to recover encryption keys that secure VPN connections and web browsing sessions.

DUHK is the third crypto-related vulnerability reported this month after KRACK Wi-Fi attack and ROCA factorization attack.

The vulnerability affects products from dozens of vendors,

Continue reading DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions

Serious Crypto-Flaw Lets Hackers Recover Private RSA Keys Used in Billions of Devices

If you think KRACK attack for WiFi is the worst vulnerability of this year, then hold on…

…we have got another one for you which is even worse.

Microsoft, Google, Lenovo, HP and Fujitsu are warning their customers of a potentially serious vulnerability in widely used RSA cryptographic library produced by German semiconductor manufacturer Infineon Technologies.

It’s noteworthy that this

Continue reading Serious Crypto-Flaw Lets Hackers Recover Private RSA Keys Used in Billions of Devices

Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption

Fail-safe measures such as encryption can help organizations minimize cloud and third-party risks in the virtually inevitable event of a data breach.

The post Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption appeared first on Security Intelligence.

Continue reading Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption

Need-to-Know Only: Use Encryption to Make Data Meaningless to Prying Eyes

Data encryption is one of the most basic — and, given the right tools, most effective — ways to protect sensitive information from cybercriminals.

The post Need-to-Know Only: Use Encryption to Make Data Meaningless to Prying Eyes appeared first on Security Intelligence.

Continue reading Need-to-Know Only: Use Encryption to Make Data Meaningless to Prying Eyes