article thumbnail

Intel, DoD start sprint to make homomorphic encryption ready for real

SC Magazine

Intel Labs announced an initiative funded by the Defense Advanced Research Projects Agency to create hardware that accelerates how computers process homomorphic encryption. Homomorphic encryption addresses a weakness in normal encryption – that being, the need for data to be decrypted before a computer can perform operations.

article thumbnail

7 Habits of a Highly Effective CISO: 2019 Data Security Resolutions

Thales Cloud Protection & Licensing

Unfortunately, with every possibility a new security risk appears, and as a CISO you are well-aware of the implications. So, what are some habits you can resolve to adopt this coming year to ensure you and your business are making the most of your data while keeping it secure? What’s in that Big Data Lake?

CISO 72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Analytics Insight Announces ‘The 10 Most Influential CISOs to Watch in 2021’

CyberSecurity Insiders

. & HYDERABAD, India–( BUSINESS WIRE )–Analytics Insight has named ‘ The 10 Most Influential CISOs to Watch in 2021 ’ in its October magazine issue. The magazine issue recognizes ten futuristic CISOs who are reimagining the business world and adopting new ways of working. He holds a Ph.D

CISO 40
article thumbnail

Federal cybersecurity: breaking down the barriers to adoption

Thales Cloud Protection & Licensing

These vulnerabilities can span from limited use of data encryption to the abuse of privileged user policies. However, modernization and transformative technologies are creating new vulnerabilities resulting in data breaches. Furthermore, over 80% of agencies feel they are already vulnerable to a data breach.

article thumbnail

How to prepare for the California Consumer Privacy Act

Thales Cloud Protection & Licensing

This creates a complex web of rules and regulations that a CISO needs to navigate to protect their company. The problem becomes ever more complex with the parallel process of digital transformation, in which Personally Identifiable Information (PII) flows across traditional on-premises, big data, and cloud environments.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

The G Suite Admin can then immediately log in to their Spinbackup account and be able to see the list of encrypted files, and either restore all of them with one click, if the “Auto-recovery” mode is on (Spinbackup automatically blocks Google Drive for PC application and recovers all encrypted files), or manually in case the mode is off.

article thumbnail

Top 18 Cybersecurity Startups to Watch in 2021

eSecurity Planet

Randori hired big names in security in 2020, including former Qualys VP of Engineering Ken Shelton, hacker Aaron Portnoy and veteran CISO Aaron Fodisck. Ubiq Security offers an API -based platform that makes it quick and easy for developers to integrate data encryption directly into applications. SECURITI.ai. SECURITI.ai