Articles about Encryption

Why quantum computing threatens security as we know it [Q&A]

Much of our current IT infrastructure relies on DNS to safely route traffic. Securing that infrastructure is in turn heavily reliant on cryptography, but there's a threat looming on the horizon.

Quantum computing will offer a level of processing power that could render current cryptographic techniques obsolete, and that's a problem for the entire internet and networking world. We spoke to Peter Lowe, principal security researcher at DNSFilter, to discuss the possible impact of quantum computing on security and what can be done to address the threat.

Continue reading

New solution secures encrypted data for a post-quantum world

quantum computing

The advent of quantum computing offers a serious threat to the safety of encrypted information. But current post-quantum cybersecurity (PQC) solutions either can't reach edge devices like laptops and mobile phones or required software installation on these devices which is cumbersome and hard to manage.

Now though QuSecure is launching a new solution for protecting encrypted private data on any website or mobile application with quantum-resilient connections and sessions, all with no end-user installation required.

Continue reading

A hybrid approach and risks to security -- quantum computing predictions for 2023

quantum computing

Quantum computing holds the promise of much faster processing speeds but is still widely viewed as still being some way in the future as a commercial proposition. It could boost machine learning and AI, and unlock the power of unstructured data.

Of course quantum also comes with security challenges thanks to its potential to crack passwords and break encryption. Here's what industry experts expect to see happening in the quantum world in 2023.

Continue reading

Encrypted attacks breach 70 percent of organizations

New research from Vectra AI finds 70 percent of organizations have fallen victim to an attack that used encrypted traffic to avoid detection, and 45 percent admit they've been victims more than once.

It's concerning that 66 percent say they don't have visibility into all their encrypted traffic, leaving them highly vulnerable to further encrypted attacks.

Continue reading

Half of IT pros believe quantum computing could put their data at risk

quantum computing

A new study from Deloitte shows 50.2 percent of professionals at organizations considering quantum computing benefits believe that their organizations are at risk from 'harvest now, decrypt later' (HNDL) cybersecurity attacks.

In HNDL attacks, threat actors harvest data from unsuspecting organizations, anticipating that data can be decrypted later when quantum computing gets sufficiently mature to render some existing cryptographic algorithms obsolete.

Continue reading

How decentralized storage can help prevent data breaches [Q&A]

Network

According to a recent IBM report the average cost of a data breach is now $4.35 million. If enterprises don't take steps to protect personal data effectively they risk losing not just money but also the trust of their customers.

We spoke to Saswata Basu, founder and CEO of 0Chain, to discuss how decentralized storage can help to address the problem.

Continue reading

Evervault is offering free encryption services to women's health apps

Secure vault

There have been several knock-on effects from the Supreme Court ruling on Roe v Wade, but few people would have predicted a change in app use habits out of fear of criminal proceedings. But this is precisely what has happened as growing numbers of users are concerned about the potential for data stored in apps to be used against them

It's just one of the reasons there has been numerous instances of users either ditching period tracking apps altogether, or switching to options considered to be more secure. Now encryption firm Evervault has offered up another solution, announcing it will offer its encryption services free of charge to women's health apps.

Continue reading

Almost half of UK organizations now encrypt all their data

Data encryption

The increasing threat of data breaches and ransomware is leading more business to encrypt all of their data according to a new report.

The report, from hardware-encrypted USB drive maker Apricorn, is based on a study of 100 UK IT decision makers carried out by Vanson Bourne and finds 47 percent now require the encryption of all data both at rest and in transit.

Continue reading

Kingston releases hardware-encrypted IronKey Vault Privacy 50 USB flash drive

We recently told you about the Kingston VP80ES IronKey Vault Privacy 80 -- a speedy portable SSD that features USB-C connectivity and a touchscreen for tapping-in a password or pin. While that drive is quite amazing, not everyone will truly need the fast speeds or touchscreen -- it could be overkill. Instead, a hardware-encrypted USB flash drive could be sufficient -- and much less expensive.

Today, Kingston launches its latest hardware-encrypted flash drive. Called "IronKey Vault Privacy 50 (VP50)," the drive uses a USB-A connector and is offered in capacities ranging from 8GB to 256GB. The VP50 features XTS-AES 256-bit encryption and is FIPS 197 certified.

Continue reading

The role of encrypted traffic analysis for threat detection [Q&A]

Everyone is striving to make their systems more secure and in many cases that means adopting encryption in order to protect data.

But the use of encrypted traffic over networks presents a headache for security teams as malicious content can be harder to detect. We spoke to Thomas Pore, director of security products at Live Action, to find out more about the problem and how it can be addressed.

Continue reading

Kingston VP80ES IronKey Vault Privacy 80 is an encrypted USB-C SSD with touchscreen

Solid state drives don't just make wonderful internal boot drives for computers -- they're excellent for external storage too. Not only are they smaller than mechanical hard disk drives, but they use less power and are much faster as well. Quite frankly, if you are someone that needs to transport data on a portable drive, you'd be insane to still use a HDD with moving parts.

But what if you lose that external solid state drive? Well, if the content is unencrypted, your files could be exposed to the finder. This is particularly problematic for business users that are storing company secrets or private customer data. Thankfully, a new USB-C solid state drive from Kingston makes it super easy to encrypt and decrypt your data. You see, the VP80ES IronKey Vault Privacy 80 is a hardware-encrypted (FIPS 197 certified with XTS-AES 256-bit) SSD with a color touchscreen that allows you to enter a passcode, password, pin, or phrase.

Continue reading

New solution aims to address quantum security threats

quantum computing

We all know that quantum computing is going to offer a major boost in computing power. But that power also represents a threat to cryptographic systems, potentially putting the world's data at risk.

To address the issue QuSecure is launching an industry first end-to-end post-quantum cybersecurity (PQC) software-based solution designed to protect encrypted communications and data with quantum-resilience.

Continue reading

Enterprises poorly protected against third-party risks

Risk dial

A new report from compliance and risk management firm Kiteworks shows 51 percent of organizations are inadequately protected against third-party security and compliance risks related to sensitive content communications.

It also reveals that most organizations share sensitive content with a long list of third-party entities. Two-thirds do so with more than 1,000 third parties, while one-third have over 2,500.

Continue reading

Why PKI still has a key role in security [Q&A]

Encryption

The origins of Public Key Infrastructure (PKI) date back to the 1970s and research at UK intelligence agency GCHQ, though it didn't emerge from the secret world and take off commercially until the 1990s.

PKI still underlies a great deal of modern cryptography, so we spoke to Ryan Sanders, senior product marketing manager at Keyfactor, to find out more about it and why it isn’t going away any time soon.

Continue reading

The internet is getting safer but legacy encryption techniques still linger

A new report from Venafi, based on in-depth security analysis of the world's top million websites over the last 18 months, shows the internet is becoming more secure.

Use of encryption is increasing and the adoption of newer TLS protocols is rising. However, many companies continue to use legacy RSA encryption algorithms to generate keys, despite stronger protocols being available.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.