article thumbnail

Preparing for the quantum-safe encryption future

CSO Magazine

Security experts and scientists predict that quantum computers will one day be able to break commonly used encryption methods rendering email, secure banking, crypto currencies, and communications systems vulnerable to significant cybersecurity threats. To read this article in full, please click here

article thumbnail

CSO's ultimate guide to security and privacy laws, regulations, and compliance

CSO Magazine

CSO's ultimate guide to security and privacy laws, regulations, and compliance Security and privacy laws, regulations, and compliance: The complete guide This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. NERC) standards. Massachusetts Bill H.4806

CSO 128
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BrandPost: Novel Encryption Technique Helps Lockfile Ransomware Hide in Plain Sight

CSO Magazine

It’s known as “intermittent encryption” and researchers from Sophos recently discovered Lockfile encrypts alternate bundles of 16 bytes in a document to stay hidden. This novel approach helps the ransomware to avoid triggering a red flag because the new encryption method looks statistically very similar to the unencrypted original.

article thumbnail

New Intel CPU-level threat detection capabilities target ransomware

CSO Magazine

Keep up on the latest thought leadership, insights, how-to, and analysis on IT security through CSO Online’s newsletters. ]. These include things like trusted execution, virtualization, memory encryption, runtime BIOS resilience and threat detection technology ( Intel TDT ). To read this article in full, please click here

article thumbnail

BrandPost: Network Encryption, Modern Applications Impact Security Visibility

CSO Magazine

There has been massive growth in the encryption of Internet traffic—from 50% in January 2014 to 95% as of March 20, 2021, according to Google’s Transparency Report. It’s a good thing that organizations are using encryption to protect critical network data. However, adversaries are also using the technology.

article thumbnail

Intelligent Waves LLC Promotes John Hammes to Chief Strategy Officer (CSO)

CyberSecurity Insiders

Through its patented IP Spread Spectrum technology, GP leverages the cloud to randomize and distribute message packets through the simultaneous use of multiple transport paths and encrypted channels. The post Intelligent Waves LLC Promotes John Hammes to Chief Strategy Officer (CSO) appeared first on Cybersecurity Insiders.

CSO 40
article thumbnail

IBM unveils end-to-end, quantum-safe tools to secure business, government data

CSO Magazine

Technology giant IBM has debuted a new set of tools and capabilities designed as an end-to-end, quantum-safe solution to secure organizations and governmental agencies as they head toward the post-quantum computing era. To read this article in full, please click here