encryption

Google offers Adiantum Mobile Security to entry-level Android smartphones

Google LLC has made it official that it is going to offer Adiantum mobile security to entry-level Android smartphones developed to encrypt data on devices that do not operate on the latest ARMv8 Processors. The objective of the latest offering is to secure devices that are unable to support Advanced Encryption Standard (AES) that are […]

Tech companies against ‘Coalition Bill’ which expose customers to Government Spies

A private body named ‘The Digital Industry Group’ representing tech companies Facebook, Google, Amazon, and Twitter has expressed its concern over a ‘Coalition bill’ which forces the companies to assist law enforcement agencies like ASIO(Australian Security Intelligence Organization) in decrypting private communications. In simple terms, the tech companies are against a government-drafted bill brought into […]

US CLOUD Act Drives Adoption of Cloud Encryption

This post was originally published here by Rich Campagna. The US Clarifying Lawful Overseas Use of Data (CLOUD) Act was quietly enacted into law on March 23, 2018. I say quietly due to the controversial nature of how it was passed – snuck into the back of a 2,300 page Federal spending bill on the eve of […]

Twitter to announce “Secret Conversation” by this year-end

Twitter, one of the worlds renowned social networking platform is all set to announce a tool called “Secret Conversation” by this year-end. The company is reported to have started the testing of its application package on some of its trusted users and is all set to announce it on an official note by the next […]

Five Ways to Improve Enterprise Email Security

Email is still the main source of communication for enterprises and most businesses. However, employees go about their daily routine sending, receiving, and opening emails and attachments with little to no thought of the potential risk that unsecured emails can do to the enterprise. Email security is a critical risk for many businesses. In fact, […]

How to protect your enterprise from Computer Viruses, Hackers, Spyware, and Ransomware

In the digital world, an SMB can simply be financially ruined with the help viruses, spyware, and ransomware spread by hackers. So, for such businesses, computer protection plays an equally important role on par with accounting and marketing. For this reason, Cybersecurity Insiders is offering some simple tips to help businesses protect themselves from ever-evolving […]

Amazon Web Services offers new Cloud Security feature to vulnerable S3 customers

From early this year, they have been multiple high profile incidents which said that AWS customers have inadvertently left data unprotected on S3 servers making it easy to access for hackers. For instance, a well known hacking group was found accessing unprotected data of Accenture and Dow Jones from Amazon’s Simple Storage Service. Obviously, such […]

Hacks on Servers and Cloud Databases exposes over 1 billion records

IBM X Force, a firm which analysis malware on cloud platforms has discovered in its research that hacks on servers and cloud databases has so far exposed over 1 billion records to cyber crooks. The company which has been tracking publicly disclosed data breaches since 2013 concludes that the leak has occurred mostly through trivial […]

IBM to offer Next Generation Mainframe with encryption driven Cyber Security

IBM has announced that its next generation Mainframe will be offered with innovation driven cyber security along with the feature of processing 12 billion encrypted transactions per day which are 5 fold increase compared to its predecessor. Known as IBM ‘Z’  the machine will have a memory power of 32 terabytes which is triple than […]

Consider these Cloud Security Tips while moving data or workloads to Cloud

As long as the data or workloads remain in your corporate territory, you are the only boss who could access and manage it. But when you plan to move your workloads to external data centers, then technically the usual parameters related to network perimeter security doesn’t apply. Therefore, before making a Service Level Agreement (SLA) […]

Share this page