Remove Encryption Remove Risk Remove Whitepaper
article thumbnail

The evolution of ransomware in 2019: attackers think bigger, go deeper and grow more advanced

Security Affairs

The findings come as highlights of Group-IB whitepaper titled “ Ransomware Uncovered: Attackers’ Latest Methods ,” closely examining the evolution of the ransomware operators’ strategies over the past year, issued today. Last year, ransomware operators matured considerably, having joined Big Game Hunting and going beyond file encryption.

article thumbnail

Post-Quantum Cryptography: Lessons Learned from SHA-1 Deprecation

Security Boulevard

For businesses still using the broken SHA-1, they were facing serious risks , including: Increased possibility of a collision or man-in-the-middle attack. NIST has developed a whitepaper which outlines the steps for migration to post-quantum cryptography. Post-Quantum Encryption Algorithms Announced. Crypto-agility.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Six existential threats posed by the future of 5G (Part One)

CyberSecurity Insiders

Below, we explore these risk factors in depth and determine what can be done to mitigate the threat moving forward. This move to the virtual brings a variety of new security risks including, danger of cross-contamination, data leakage and the spread of malware – all of which we can bet malicious actors will be waiting to take advantage of.

IoT 101
article thumbnail

Anton’s Security Blog Quarterly Q1 2021

Security Boulevard

Data security: “New whitepaper: Designing and deploying a data security strategy with Google Cloud” [GCP Blog]. The cloud trust paradox: 3 scenarios where keeping encryption keys off the cloud may be necessary” [GCP Blog]. “The Lost in translation: encryption, key management, and real security” [GCP Blog].

article thumbnail

Six existential threats posed by the future of 5G (Part Two)

CyberSecurity Insiders

Here, we take a deeper look into another three high-risk areas telecoms companies need to address as 5G technology progresses and more people begin to use the network. For more information on building a 5G world we can all trust, see our whitepaper here , or tweet us @ThalesDigiSec with your questions.

Mobile 101
article thumbnail

Verizon’s 2022 Mobile Security Index Report – Confirming what we all suspected

Thales Cloud Protection & Licensing

From the foreword of the report, all the way to the end, the analysis indicates that mobile devices pose a greater risk to organizations. Countering all of the risks is an increased security spend, as the report indicates that 77% of respondents indicated that they are devoting more budget to security. Identity & Access Management.

Mobile 71
article thumbnail

To Achieve Zero Trust Security, Trust The Human Element

Thales Cloud Protection & Licensing

With more employees working remotely than ever before due to COVID-19, businesses are at greater risk from a cyber-attack with workers accessing systems outside of the usual company network. You can’t scrimp on discovery, but no standard risk assessment scales. Finally, embrace third party risk management. Encryption.