article thumbnail

MY TAKE: Agile cryptography is coming, now that ‘attribute-based encryption’ is ready for prime time

The Last Watchdog

Encryption agility is going to be essential as we move forward with digital transformation. All of the technical innovation cybersecurity vendors are churning out to deal with ever-expanding cyber risks, at the end of the day, come down to protecting encrypted data. Refer: The vital role of basic research.

article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

Accounting for third-party risks is now mandated by regulations — with teeth. Allen is a widely respected thought leader on this topic, having launched Shared Assessments in 2005 as an intel-sharing and training consortium focused on third-party risks. That out of the way, business can proceed with less risk.

Risk 164
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Database Encryption Key Management

Thales Cloud Protection & Licensing

Large data scale breaches have led an increasing number of companies to embrace comprehensive encryption strategies to protect their assets. According to our 2018 Global Encryption Trends Study , 43% of respondents report that their organization has an encryption strategy they apply across the enterprise, compared with 15% in 2005.

article thumbnail

A database containing data of +8.9 million Zacks users was leaked online

Security Affairs

The company attempted to downplay the security breach by telling Have I Been Pwned that threat actors only had access to encrypted passwords. According to the notice, threat actors had access to an older database of customers who had signed up for the Zacks Elite product between November 1999 through February 2005.

article thumbnail

Thales & LuxTrust: A Partnership for Data Sovereignty and Compliance

Thales Cloud Protection & Licensing

Many organizations are strategically partnering with specialized Managed Security Service Providers (MSSPs) as they recognize the complexity of managing cryptographic keys and encryption processes. An archiving platform ensuring long-term data preservation and protection. A consent management platform prioritizing user privacy and control.

article thumbnail

Post-Quantum Cryptography: Lessons Learned from SHA-1 Deprecation

Security Boulevard

Since 2005, SHA-1 has been regarded as unsafe against well-funded adversaries. For businesses still using the broken SHA-1, they were facing serious risks , including: Increased possibility of a collision or man-in-the-middle attack. Post-Quantum Encryption Algorithms Announced. What SHA-1 history can teach us? Related Posts.

article thumbnail

Thales & LuxTrust: A Partnership for Data Sovereignty and Compliance

Security Boulevard

Many organizations are strategically partnering with specialized Managed Security Service Providers (MSSPs) as they recognize the complexity of managing cryptographic keys and encryption processes. An archiving platform ensuring long-term data preservation and protection. A consent management platform prioritizing user privacy and control.