Encryption

Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation

Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation 2024-08-13 at 15:16 By Kevin Townsend SecurityWeek speaks to Michael Osborne, CTO of IBM Quantum Safe, for a better understanding of the need for and principles of quantum safe cryptography. The post Post-Quantum Cryptography Standards Officially Announced by NIST – a History and […]

React to this headline:

Loading spinner

Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation Read More »

Overlooked essentials: API security best practices

Overlooked essentials: API security best practices 2024-07-17 at 07:31 By Mirko Zorz In this Help Net Security, Ankita Gupta, CEO at Akto, discusses API security best practices, advocating for authentication protocols like OAuth 2.0 and OpenID Connect, strict HTTPS encryption, and the use of JWTs for stateless authentication. Gupta recommends role-based access control (RBAC) and

React to this headline:

Loading spinner

Overlooked essentials: API security best practices Read More »

Encrypted traffic: A double-edged sword for network defenders

Encrypted traffic: A double-edged sword for network defenders 2024-07-15 at 06:31 By Help Net Security Organizations are ramping up their use of encrypted traffic to lock down data. Could they be making it easier to hide threats in the process? On one hand, encryption means enhanced privacy, but it can also make the job of

React to this headline:

Loading spinner

Encrypted traffic: A double-edged sword for network defenders Read More »

Preparing for Q-Day as NIST nears approval of PQC standards

Preparing for Q-Day as NIST nears approval of PQC standards 2024-07-01 at 06:32 By Help Net Security Q-Day—the day when a cryptographically relevant quantum computer can break most forms of modern encryption—is fast approaching, leaving the complex systems our societies rely on vulnerable to a new wave of cyberattacks. While estimates just a few years

React to this headline:

Loading spinner

Preparing for Q-Day as NIST nears approval of PQC standards Read More »

Preparing for a post-quantum future

Preparing for a post-quantum future 2024-06-18 at 06:31 By Help Net Security Post-quantum cryptography (PQC) is a hot topic. A recent paper from Tsinghua University raised doubts about lattice-based cryptography for PQC, though an error was found. This has sparked questions about the strength of soon-to-be-standardized PQC algorithms. In this Help Net Security video, Kevin

React to this headline:

Loading spinner

Preparing for a post-quantum future Read More »

Windows Recall will be opt-in and the data more secure, Microsoft says

Windows Recall will be opt-in and the data more secure, Microsoft says 2024-06-07 at 22:02 By Zeljka Zorz The insistent public complaints and proof-of-concept tools have have borne fruit: Microsoft has realized that the security of its recently previewed Windows Recall feature leaves much to be desired, and has announced important changes. About Windows Recall

React to this headline:

Loading spinner

Windows Recall will be opt-in and the data more secure, Microsoft says Read More »

Encrypted Notepad: Open-source text editor

Encrypted Notepad: Open-source text editor 2024-05-31 at 06:33 By Mirko Zorz Encrypted Notepad, an open-source text editor, ensures your files are saved and loaded encrypted with AES-256. With no ads, no network connection required, and no unnecessary features, it’s a tool that simply works. “Like the Windows Notepad app, it has no features besides text

React to this headline:

Loading spinner

Encrypted Notepad: Open-source text editor Read More »

Zoom Adding Post-Quantum End-to-End Encryption to Products

Zoom Adding Post-Quantum End-to-End Encryption to Products 2024-05-21 at 16:46 By Eduard Kovacs Zoom is announcing post-quantum end-to-end encryption on Meetings, with Phone and Rooms coming soon.  The post Zoom Adding Post-Quantum End-to-End Encryption to Products appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this

React to this headline:

Loading spinner

Zoom Adding Post-Quantum End-to-End Encryption to Products Read More »

How secure is the “Password Protection” on your files and drives?

How secure is the “Password Protection” on your files and drives? 2024-05-10 at 08:31 By Help Net Security People in certain professions, such as healthcare, law, and corporations, often rely on password protection when sending files via email, believing it provides adequate security against prying eyes. However, simple password protection on a PDF or Excel

React to this headline:

Loading spinner

How secure is the “Password Protection” on your files and drives? Read More »

Niobium Raises $5.5M for Zero Trust Computing Hardware Acceleration

Niobium Raises $5.5M for Zero Trust Computing Hardware Acceleration 2024-05-07 at 19:01 By Eduard Kovacs Niobium has raised $5.5 million in seed funding for a fully homomorphic encryption (FHE) hardware accelerator designed for zero trust computing. The post Niobium Raises $5.5M for Zero Trust Computing Hardware Acceleration appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Niobium Raises $5.5M for Zero Trust Computing Hardware Acceleration Read More »

Q-Day approaching: Can Ethereum survive a quantum emergency?

Q-Day approaching: Can Ethereum survive a quantum emergency? 2024-04-26 at 17:02 By Cointelegraph by Daniel Ramirez-Escudero Quantum computing is the next most significant disruptive technological leap and its rapid evolution and funding will soon make it a reality. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

Q-Day approaching: Can Ethereum survive a quantum emergency? Read More »

Critical PuTTY Vulnerability Allows Secret Key Recovery

Critical PuTTY Vulnerability Allows Secret Key Recovery 2024-04-16 at 20:01 By Eduard Kovacs PuTTY vulnerability CVE-2024-31497 allows attackers to compromise private keys and use them to forge signatures.  The post Critical PuTTY Vulnerability Allows Secret Key Recovery appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to

React to this headline:

Loading spinner

Critical PuTTY Vulnerability Allows Secret Key Recovery Read More »

How Google’s 90-day TLS certificate validity proposal will affect enterprises

How Google’s 90-day TLS certificate validity proposal will affect enterprises 2024-04-11 at 08:01 By Help Net Security Announced last year, Google’s proposal to reduce the lifespan of TLS (transport layer security) certificates from 13 months to 90 days could be implemented in the near future. It will certainly improve security and shrink the window of

React to this headline:

Loading spinner

How Google’s 90-day TLS certificate validity proposal will affect enterprises Read More »

Surviving the “quantum apocalypse” with fully homomorphic encryption

Surviving the “quantum apocalypse” with fully homomorphic encryption 2024-03-19 at 10:04 By Help Net Security In the past few years, an increasing number of tech companies, organizations, and even governments have been working on one of the next big things in the tech world: successfully building quantum computers. These actors see a lot of potential

React to this headline:

Loading spinner

Surviving the “quantum apocalypse” with fully homomorphic encryption Read More »

How organizations can keep up with shifting data privacy regulations

How organizations can keep up with shifting data privacy regulations 2024-03-12 at 06:31 By Help Net Security With no sign of regulations slowing down, enterprises struggle to keep pace with the rapid changes. According to a recent NTT Data survey of business executives, 3 in 4 organizations can’t keep up with data regulations, holding them

React to this headline:

Loading spinner

How organizations can keep up with shifting data privacy regulations Read More »

Cryptography Firm Zama Raises $73 Million for FHE Solution

Cryptography Firm Zama Raises $73 Million for FHE Solution 2024-03-07 at 18:38 By Eduard Kovacs Zama raises $73 million in Series A funding for a fully homomorphic encryption (FHE) solution for AI and blockchain applications. The post Cryptography Firm Zama Raises $73 Million for FHE Solution appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Cryptography Firm Zama Raises $73 Million for FHE Solution Read More »

Secure your hybrid workforce: The advantages of encrypted storage

Secure your hybrid workforce: The advantages of encrypted storage 2024-03-05 at 07:02 By Help Net Security In this Help Net Security video, Ryan Amparo, Field Application Engineer at Kingston Technology, discusses the benefits of encrypted external SSDs and USBs for hybrid workforces. He talks about the differences between software and hardware encryption, why it’s important,

React to this headline:

Loading spinner

Secure your hybrid workforce: The advantages of encrypted storage Read More »

Cyber Insights 2024: Quantum and the Cryptopocalypse

Cyber Insights 2024: Quantum and the Cryptopocalypse 2024-02-27 at 16:46 By Kevin Townsend Quantum computers are coming, and will defeat current PKE encryption. But this cryptopocalypse is not dependent upon quantum computers — it could happen through other means, at any time. The post Cyber Insights 2024: Quantum and the Cryptopocalypse appeared first on SecurityWeek.

React to this headline:

Loading spinner

Cyber Insights 2024: Quantum and the Cryptopocalypse Read More »

Apple Adds Post-Quantum Encryption to iMessage

Apple Adds Post-Quantum Encryption to iMessage 2024-02-21 at 16:46 By Eduard Kovacs Apple unveils PQ3, a new post-quantum cryptographic protocol for iMessage designed to protect communications against quantum computing attacks. The post Apple Adds Post-Quantum Encryption to iMessage appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Apple Adds Post-Quantum Encryption to iMessage Read More »

Balancing “super app” ambitions with privacy

Balancing “super app” ambitions with privacy 2024-02-19 at 08:31 By Help Net Security When Elon Musk’s ambitions to transform X into an “everything app” were divulged last year, he joined several companies known to be exploring or actively working on developing super apps, suggesting there’s clearly a niche to be filled. In fact, since the

React to this headline:

Loading spinner

Balancing “super app” ambitions with privacy Read More »

Scroll to Top