In a multinational effort led by the Dutch National Police, authorities seized servers and web domains used by DoubleVPN, a Russia-based company that allegedly provided a safe operating infrastructure for cybercriminals, according to Europol.
Security specialists are offering preliminary feedback on Microsoft's sneak peek at the new security measures to be included in the Windows 11 operating system, which is slated for release in December.
For most organizations, the rationale for employing data security solutions is crisis mitigation associated with potential data breaches - driven by compliance regulations, possible fines and reputation loss. There is, however, another compelling rationale for strong data security program that a growing number of...
What do the world's leading encryption and security experts think about non-fungible tokens, supply chain attacks, coordinated vulnerability disclosure and the state of quantum computing? The cryptographers' panel at RSA Conference 2021 addressed all these issues.
Organisations in Australia have expanded their use of encryption to protect cloud and on-premises data and applications, but what challenges are they facing? And what tools do they find most effective?
The 2021 Australia Encryption Trends Study, conducted by the Ponemon Institute and sponsored by Entrust, will be...
Can courts trust evidence collected by Cellebrite's mobile device forensic tools? Matt Bergin of KoreLogic has found new vulnerabilities in Cellebrite's software that he will present on Friday at Black Hat Asia. He says that forensics software should be put through rigorous penetration tests.
Law enforcement agencies use forensics tools from Israeli company Cellebrite to gain access to locked mobile devices and extract data. But the creator of encrypted messaging app Signal says he's found vulnerabilities in Cellebrite's tools, raising questions about whether the extracted data can be trusted.
Given the surge in the use of telehealth during the COVID-19 pandemic - and expectations for continued growth - the Healthcare and Public Health Sector Coordinating Council has unveiled guidance on safeguarding patient data during remote care encounters.
New encryption standards TLS 1.3 and DNS-over-HTTPS (DoH) will soon sweep away security controls. Security professionals must act within the next two years or they won't be able to analyze network traffic and detect cyberthreats.
Download the Forrester report —Maintain Security Visibility in the TLS 1.3 Era —...
The 2021 Global Encryption Trends Study, the most comprehensive encryption survey in the industry, highlights how organizations are managing encryption strategies and data security threats across multiple clouds. The results are clear: sensitive data is still at risk and more scattered than ever.
Encryption leaves gaping holes in data protection - by protecting data at rest and in motion, but not in use. Tokenization safeguards data at the cost of usability and performance.
Download this white paper and learn how your organization can:
More easily access data and ensure its protection;
Ensure data is both...
In-Use encryption is the next generation of encryption technology that ensures that sensitive data is never left unsecured, regardless of lifecycle stage (at rest, in transit, or in use) or location (on premise, cloud, or hybrid).
Download this white paper and learn about:
The shortfalls that persist with...