article thumbnail

Key Findings from the 2017 Thales Encryption Trends Study: Australia

Thales Cloud Protection & Licensing

The 2017 Thales Encryption Trends Study Australia found the IT department’s influence over encryption strategy has more than halved in the past five years from 59 per cent to 28 per cent. Our report also found that 55 per cent of organisations say finding where sensitive data resides is their top encryption challenge.

article thumbnail

Analysis of Xloader’s C2 Network Encryption

Security Boulevard

In October 2020, Formbook was rebranded as Xloader and some significant improvements were introduced, especially related to the command and control (C2) network encryption. In 2017, Formbook’s panel source was leaked, and subsequently, the threat actor behind Xloader moved to a different business model. Xloader PUSHEBP encrypted block.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Key Findings from the 2017 Thales Encryption Trends Study: Australia

Thales Cloud Protection & Licensing

The 2017 Thales Encryption Trends Study Australia found the IT department’s influence over encryption strategy has more than halved in the past five years from 59 per cent to 28 per cent. Our report also found that 55 per cent of organisations say finding where sensitive data resides is their top encryption challenge.

article thumbnail

CipherTrust Data Security Platform now allows users to control encryption keys for data processed by Google Cloud’s Confidential Computing

Thales Cloud Protection & Licensing

CipherTrust Data Security Platform now allows users to control encryption keys for data processed by Google Cloud’s Confidential Computing. The Thales partnership with Google Cloud takes a huge step forward with the announcement of Google Cloud ubiquitous data encryption. Tue, 10/19/2021 - 06:19.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

Guest Blog: TalkingTrust. In 2017, Tesla sent an over-the-air update to their Model S and X vehicles to extend maximum battery capacity and driving range, which allowed owners to drive an extra 30 miles outside the evacuation area as Hurricane Irma was bearing down on Florida. The same rings true for encryption and authentication.

IoT 78
article thumbnail

The importance of encryption in complying with Australia’s Privacy Amendment Act

Thales Cloud Protection & Licensing

November 2017 saw one of Australia’s biggest ever data breaches, in which sensitive personal information regarding almost 50,000 consumers and 5,000 public servants was exposed online. Here then, as with the breaches mentioned above, we can see the importance of an “encrypt everything” strategy, as referred to in my previous post.

article thumbnail

Post-Quantum Cryptography: Lessons Learned from SHA-1 Deprecation

Security Boulevard

Despite all the emphasis around the shift from SHA-1 to SHA-2, 35% of websites were still utilizing SHA-1 certificates as of November 2016, according to research from Venafi in 2017. Post-Quantum Encryption Algorithms Announced. Challenges toward post-quantum cryptography: confidentiality and authentication. SHA-1 Deprecation.