Tag "Encryption"

Back to homepage
Industry Insights

Why Encryption Is Now a ‘Need to Have,’ Not Just a ‘Nice to Have’

By Linus Chang, CEO and Founder at Scram Software, Cloud-based services are so commonplace today that it’s tempting to simply trust them with your data. After all, everyone else is

Industry Insights

10 Reasons not to Innovate your Cybersecurity

You’ve never been hacked before, and you’re confident you know where you critical or sensitive data is at all times. Why change something that’s working today? No business can ever

IT Compliance

GDPR compliance: Identifying an organization’s unique profile

After a two-year transition period, the General Data Protection Regulation (GDPR) becomes enforceable beginning 25 May 2018. Presumably, many large companies have been working on a compliance program for months

Hardware/Network

The importance of inspecting encrypted traffic

Many adversaries to enterprise cybersecurity are using sophisticated encryption tactics to bypass defences and infiltrate networks. Enterprises are trying to fight back by employing HTTPS and using SSH, as well

Cloud

SANS Experts Share Five Most Dangerous New Attack Techniques

Experts from SANS last night presented the five most dangerous new cyber attack techniques in their annual RSA keynote session in San Francisco, and shared their views on how they

IT Compliance

How to Comply with GDPR

In a little over a month – on May 25, to be precise – the EU’s General Data Protection Regulation (GDPR) will take effect, and if your company is not

Identity Theft

Encryption an increasingly popular solution among organisations

Saves against human error, data theft or compliance issues.Organisations are turning towards encryption to keep their data safe, new reports from Thales are saying. The critical information systems company issued

Software

What should define an enterprise encryption strategy?

The impact of the cyber security landscape is changing, with ‘protecting against specific identified threats’ knocking compliance off the top spot as the number one reason for deploying encryption. Securing

Software

How to detect and prevent crypto mining malware

Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.Hackers are turning to cryptojacking

Cloud

2018 Cloud Security Report Released Today

Crowd Research Partners today released the 2018 Cloud Security Report which includes the following takeaways. Cloud Security Issues-The top three security control challenges security operations centers (SOCs) are struggling with