article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities. Notable cybersecurity exits for the company include AVG Technologies, Cognitive Security, OpenDNS, and Carbon Black. AllegisCyber Capital. Evolution Equity Partners. EEP Investments.

article thumbnail

Identity-based Cryptography

Thales Cloud Protection & Licensing

The first practical IBE scheme was given by Boneh and Franklin [7] in 2001 using bilinear pairing on elliptic curves. Since 2001, various extensions of normal IBE/IBS have been proposed: Identity-based signcrypt schemes. 8,9]) combines signature and encryption in a secure way, providing efficient joint authentication and encryption.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight on Cybersecurity Leaders: William Lidster

SecureWorld News

Answer : Cybersecurity became front-and-center for most organizations globally in 2001, and I was already dabbling in it as an additional consideration with my IT management duties. A : Outside of training and awareness, full-on MFA (multi-factor authentication). Get to know William Lidster.

article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

Related: How ‘PAM’ improves authentication. Some context about remote desktop controls: Back in 2001, when company networks were assembled around on-premises data centers, Microsoft began including RDC in all versions of Windows. SMBs today face a daunting balancing act. That’s much easier said than done.

article thumbnail

International Women’s Day: Celebrating female-led innovation

CyberSecurity Insiders

Her work has led Anne to participate in some impressive collaborations on biometric technology, including working with the U.S. institute of Standards and Technology, working on several biometric standards subcommittees, and collaborating with universities to explore new research projects.

article thumbnail

The strengths and weaknesses of different VPN protocols

Security Affairs

Since then, VPN protocol technology has evolved and, at the moment, there are five widely used VPN protocols. The protocol relies on encryption, authentication and peer-to-peer protocol (PPP) negotiation. First released in 2001, the OpenVPN protocol has become one of the most popular and widely used protocols.

VPN 83
article thumbnail

Types of Encryption, Methods & Use Cases

eSecurity Planet

National Bureau of Standards (now the National Institute of Standards and Technology, or NIST) made a public request for potential ciphers. The RSA algorithm remains the most popular public key cryptographic system today and introduced the concept of digital signatures for authentication outside of academia.