Security News

Database encryption: Protecting the crown jewels
2021-02-22 06:30

They can also copy the entire database - including files that contain many of the corporate crown jewels. There are a variety of technologies for database encryption.

Homomorphic encryption: Myths and misconceptions
2021-02-18 06:30

I like tackling misconceptions relating to innovative technical advancements in my own line of work, and here I'll talk about homomorphic encryption. Here are four misconceptions about homomorphic encryption that should be considered by anyone interested in potential use cases.

Quantum computing and encryption: Key to achieving resilience, technological sovereignty and leadership
2021-02-15 05:00

One such document is the new EU Cybersecurity Strategy, which mentions quantum computing and encryption as key technologies for achieving resilience, technological sovereignty and leadership. Quantum technology will enable a huge leap forward in many branches of industry, as it can efficiently resolve problems technologies of today are not able to provide a solution for.

Cornami and Inpher deliver Fully Homomorphic Encryption to modern innovators
2021-02-10 01:30

FHE has long been described as transformative for data privacy and cloud security as it enables computing on encrypted data sets, thereby keeping the underlying data secure. With Secret Computing technology, data scientists can finally build advanced analytics and Artificial Intelligence models on distributed data sources without ever exposing or transferring sensitive data across departments, organizations, or jurisdictions.

SolarWinds Hack Prompts Congress to Put NSA in Encryption Hot Seat
2021-02-01 21:12

"In 2015, Juniper revealed a security breach in which hackers modified the software the company delivered to its customers," a Wyden statement read. "Researchers subsequently discovered that Juniper had been using an NSA-designed encryption algorithm, which experts had long argued contained a backdoor, and that the hackers modified the key to this backdoor." "The American people have a right to know why NSA did not act after the Juniper hack to protect the government from the serious threat posed by supply chain hacks. A similar supply chain hack was used in the recent SolarWinds breach, in which several government agencies were compromised with malware snuck into the company's software updates," the members wrote.

Google Discloses Severe Bug in Libgcrypt Encryption Library—Impacting Many Projects
2021-02-01 02:47

A "Severe" vulnerability in GNU Privacy Guard's Libgcrypt encryption software could have allowed an attacker to write arbitrary data to the target machine, potentially leading to remote code execution. The flaw, which affects version 1.9.0 of libgcrypt, was discovered on January 28 by Tavis Ormandy of Project Zero, a security research unit within Google dedicated to finding zero-day bugs in hardware and software systems.

Encrypted Services Providers Concerned About EU Proposal for Encryption Backdoors
2021-01-29 12:44

European encrypted services providers ProtonMail, Threema, Tresorit and Tutanota on Thursday urged European Union policy makers to rethink plans that would require the implementation of encryption backdoors. The Council of the European Union in December adopted a resolution on "Security through encryption and security despite encryption." The council said it supports the development and use of strong encryption to protect citizens and organizations, but at the same time it believes law enforcement and judicial authorities need to be able to exercise their legal powers.

How do I select a data encryption solution for my business?
2021-01-25 05:30

To select a suitable data encryption solution for your business, you need to think about a variety of factors. Selecting a data encryption solution for your business should follow the same principles used for assessing any technology before deploying it within your organization: usability, scalability, cross-platform, adaptability and compliance.

CHwapi hospital hit by Windows BitLocker encryption cyberattack
2021-01-21 11:22

The CHwapi hospital in Belgium is suffering from a cyberattack where threat actors claim to have encrypted 40 servers and 100 TB of data using Windows Bitlocker. On Sunday, CHwapi suffered an attack that caused the hospital to redirect patients to other hospitals and delay surgical procedures.

Baffle DPS on AWS simplifies tokenization and encryption of data stored in Amazon RDS
2021-01-18 08:45

Baffle announced that its Data Protection Services on AWS dramatically simplifies tokenization and encryption of data stored in Amazon Relational Database Service environments without any application code modifications while supporting a Bring Your Own Key or Hold Your Own Key model. As an AWS Select Technology Partner, Baffle DPS gives enterprises the ability to instantly apply data-centric security for data stored in AWS without any application changes.