Encryption | SC Media

Encryption

Future-proof cybersecurity: Addressing implementation challenges in quantum cryptography

As cyberattacks grow in number and sophistication, it is essential that data is protected. But in today’s evolving threat landscape, this is not as simple as applying traditional security to communications systems. Indeed, many current systems use protocols based on mathematical problems, such as integer factorization, which could be easily cracked by quantum computers of…

Adiantum boosts encryption for low-end Android devices

Google has developed a new storage encryption solution that will boost encryption capabilities for low-end Android devices that don’t have the hardware to support AES. Researchers said the new solution, called Adiantum, allows the use of the ChaCha stream cipher “in a length-preserving mode, by adapting ideas from AES-based proposals for length-preserving encryption such as HCTR and HCH,”…

Cloud-based security management

Over the past few years there has been quite a bit of conjecture around the security market and how it will continue to evolve. Security professionals have started to find their own real success against hackers comes from using the same tools and techniques as hackers to turn the tides. Mike Diehl Increasingly, security products are…

Cloud-based security products – Group Test

This month we focused on five products in the cloud-based security space that solve a problem almost every organization faces – the ability to have a broad security solution that can span over a multifaceted infrastructure environment whether it’s sitting in AWS, Azure, Google Cloud Platform, virtual environments or bare-metal on-premises machines. Mike Diehl Some…

Top cybersecurity legislation of 2019

It’s the law…almost 2018 may go down as the year the EU’s GDPR went into effect but legislators domestically kept busy introducing and passing legislation meant to bolster the U.S.’s cybersecurity and privacy postures. California Privacy Act After a rush to get legislation done so a ballot measure slated for the November election could be…

2019 Cybersecurity Predictions

Stan Lowe, CISO, Zscaler There will be an increased focus on cyber risk versus spending by governments and corporations. Cybersecurity practitioners continue to spend vast amounts of money to mitigate all risk to the extent that we are approaching, or even reached, the point where businesses can no longer sustain it. We’ll begin to see…

Australian flag

Australia passes law forcing tech giants to circumvent encryption on target devices

Australia’s parliament on Thursday passed groundbreaking legislation that instructs tech developers to help law enforcement investigations by intercepting the encrypted communications of suspects’ devices. Known as the Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018, the law contains language requiring companies in some cases to build new capabilities to decrypt protected communications if…

Marriott Starwood reservation system data breach exposes 500 million customer records

Malicious actors spent more than four years inside Marriott’s Starwood reservation system obtaining access to 500 million guest records that included names, payment card information and other PII, the hotel chain reported today. The cybercriminals gained access to, copied and encrypted a wide variety of data from guests using its reservation system, the company said.…

Amarillo City workers PII compromised

The employees of the city of Amarillo, Texas, had their personal information compromised when an outside contractor conducting an audit lost a USB drive containing their data. The contractor was conducting a required external audit of the city’s payroll when one of its workers lost an encrypted USB drive that contained the PII which included…

Next post in Data Breach