article thumbnail

Today’s CISO Insights – How to Tackle the Quantum Threat

CyberSecurity Insiders

Due to this specific way of processing, quantum computers can also break many of the current encryption algorithms used to protect data. This is why CISOs everywhere should be concerned. Most likely his data is protected using current encryption algorithms and keys. It is safe, encrypted, and should take forever to decrypt.”

CISO 133
article thumbnail

How Do You Enable End-to-End Encryption in Zoom?

SecureWorld News

The company claimed to have end to end encryption, when in reality it did not. To address these concerns, Zoom has pivoted quickly and many CISOs came to the companies defense. They announced that they will be introducing true end to end encryption in October of this year. Zoom's end to end encryption.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: The key differences between ‘information privacy’ vs. ‘information security’

The Last Watchdog

Think about your bank account, it is very important for you to know that when you deposit a check into your account the right amount is deposited. Ransomware uses encryption (typically a good thing) to make your business information un-available. still available for you to use.

article thumbnail

The Resurgence of Zero Trust: Why it’s Essential for CISOs and CIOs to Include in Their Strategy

CyberSecurity Insiders

Zero trust emphasizes the importance of micro-segmentation, multi-factor authentication, encryption, and monitoring of user behavior to prevent lateral movement within the network and detect and respond to potential threats in real time. Importance for CISOs and CIOs Zero trust is no longer just a buzzword for CISOs and CIOs.

CISO 87
article thumbnail

Protecting Sensitive Data with Luna Key Broker for Microsoft Double Key Encryption

Thales Cloud Protection & Licensing

Protecting Sensitive Data with Luna Key Broker for Microsoft Double Key Encryption. Thales has integrated its Luna HSMs with DKE for Microsoft 365, which work together to enable organizations to protect their most sensitive data while maintaining full control of their encryption keys. Thu, 04/01/2021 - 14:04.

article thumbnail

Analytics Insight Announces ‘The 10 Most Influential CISOs to Watch in 2021’

CyberSecurity Insiders

. & HYDERABAD, India–( BUSINESS WIRE )–Analytics Insight has named ‘ The 10 Most Influential CISOs to Watch in 2021 ’ in its October magazine issue. The magazine issue recognizes ten futuristic CISOs who are reimagining the business world and adopting new ways of working. He holds a Ph.D

CISO 40
article thumbnail

Episode 179: CISO Eye on the Virus Guy – Assessing COVID’s Cyber Risks

The Security Ledger

In this episode of the podcast (#179), CISO Kayne McGlandry of IEEE joins us to talk about the cyber risks posed by COVID and why COVID-themed phishing emails shouldn’t be your only concern. The emergence and spread of the COVID 19 virus has upended societies and economies around the world. Read the whole entry. »