Encryption | SC Media

Encryption

Best practices for implementing a DLP solution

Traditional defenses are no match for targeted attacks that bypass security controls and steal sensitive data. As IT changes continue to occur, organizations need to be more strategic to combat modern threats. They must shift their focus from attempting to secure everything, to protecting what matters most—the data itself. No matter where it is stored,…

Flaw impacts most new Intel chipsets

A vulnerability was found in most of the Intel chipsets released in the last five years that could allow an attacker to extract the chipset key stored on the PCH microchip and obtain access to data encrypted with the key. The issue, CVE-2019-0090, was found by Positive Technologies and resides in the Intel Converged Security…

Bug prompts Let’s Encrypt to revoke over 3M TLS certificates

Beginning today, Let’s Encrypt is revoking more than 3 million of its Transport Layer Security (TLS) certificates, following the discovery of a bug that affects the way it rechecks CAA (Certificate Authority Authorization) records. “Most subscribers issue a certificate immediately after domain control validation, but we consider a validation good for 30 days,” explained Jacob Hoffman-Andrew,…

Next post in Encryption/Data Security