encryption

Symmetric vs. Asymmetric Encryption in the Cloud: Choosing the Right Approach

Asymmetric and symmetric encryptions are the modes of encryption typically used in cryptography. There is a single key involved with symmetric encryption used both for encryption and decryption. The key needs to be shared among the parties who are involved who wish to encrypt or decrypt data. Asymmetric encryption uses two separate keys related to […]

Facebook end to end encryption a Boon or a Bane

Meta, encompassing Facebook and its subsidiaries, has staunchly advocated the end-to-end encryption safeguarding its messaging platforms, assuring users of protection against government surveillance, individual snooping, or corporate intrusion. However, the allure of highly encrypted messaging services can inadvertently provide sanctuary for criminal activities, thriving under the guise of anonymity these platforms offer. Graeme Biggar, leading […]

Will Quantum Computing Change the Way We Use Encryption?

[By Jerry Derrick, Camelot Secure] Today, encryption is a cornerstone of our cybersecurity practices. It protects everything from cell phones and SMS messages to financial transactions and intellectual property. However, a new challenge in the complex landscape of encryption has recently emerged, thanks to the advancement of quantum computing. As a provider of award-winning cybersecurity […]

Unraveling the Differences: Hashing, Salting, and Encryption Explained

In the realm of cybersecurity, understanding the nuances between hashing, salting, and encryption is crucial for safeguarding sensitive data. Each method serves a distinct purpose in protecting information, and grasping their disparities is essential for implementing robust security measures. Hashing: The Digital Fingerprint Hashing is a one-way process that transforms input data into a fixed-size […]

Sensitive data loss is due to lack of encryption

In an era where data is the lifeblood of businesses, safeguarding sensitive information has become paramount. Cybersecurity lapses have historically been a cause of data breaches, but a recent study sheds light on a new dimension of vulnerability ā€“ the lack of encryption. The Operationalizing Encryption and Key Management study, conducted by Fortanix Inc., reveals […]

Biden administration passes bill against Quantum Computing Data Breaches

Joe Biden and his administration seems be on a forward thinking gear for quantum technology linked cyber attacks leading to data breaches. On December 21st,2022, the Senate passed a bipartisan bill to prevent data breaches emerging from quantum computing. The Quantum Computing Cybersecurity Preparedness Act was made into a legislation that prevents usage of quantum […]

WhatsApp starts offering password enabled encryption to user backups

From now on, all WhatsApp backups will be protected by a password enabled encryption method offering an extra layer of security protection to users from spying eyes. The Facebook giantā€™s subsidiary has notified to all its global iOS and Android users that it will provide a 64 digit key to secure the messages stored on […]

Bitglass API Gateway Encryption

This post was originally published by Juan Lugo. Enterprises are adoptingĀ infrastructure as a service (IaaS)Ā en masse in pursuit of enhanced flexibility, productivity, and cost savings. These platforms allow organizations to upload and download data viaĀ custom applications, machines, scripts, and other automated processes. This simplifies and automates certain business processes; however, it can lead to security […]

YES! Encrypted Traffic Can (and Must) Be Classified

Encryption Trends Why is Traffic Encryption on the Rise? Everywhere you look, the use of encryption is rising: on the Internet, in public and private Clouds, within enterprises, and across personal devices. One driver of this trend is the global demand for better protection of personal privacy on the Internet. It is a demand that […]

Cloud-based shared files are vulnerable to ransomware attacks

Vectra, a California based Cyber Threat Detection and Response firm discovered in its study that cloud-based shared files are extremely vulnerable to ransomware attacks. As most Infrastructure-as-a-service (IaaS) offering cloud providers allow malicious encryption of shared files on network servers. Infiltrators can easily evade the security perimeters and target files with encryption algorithms which remain […]

Share this page