November 15, 2017 New Crysis Variant Calls for Better Ransomware Protection < 1 min read - A new variant of the Crysis ransomware highlights the need for companies to enhance their ransomware protection.
Data Protection November 15, 2017 Data Storage and Encryption Should Top the CISO’s To-Do List 4 min read - Before diving head-first into a data storage and encryption strategy, the CISO must decide which solutions best address the organization's unique needs.
X-Force November 6, 2017 How Not to Store Passwords: SHA-1 Fails Again 3 min read - Symmetric key encryption, password hashing and SHA-1 are all ineffective ways to store passwords during the software development stage.
Data Protection November 3, 2017 The Power and Versatility of Pervasive Encryption 3 min read - Pervasive encryption is a powerful, customizable feature of the IBM z14 mainframe that enables security teams to protect all data and maintain compliance.
October 30, 2017 DUHK Vulnerability Offers a Quick Way to Launch a Crypto Attack 2 min read - Security researchers exposed a vulnerability in a random number generator with hardcoded keys that could lead to a crypto attack.
October 17, 2017 RSA Key Insecurity Places Business Data at Risk 2 min read - Researchers found that TPM chipsets manufactured by Infineon create weak RSA key information, which could enable fraudsters to compromise corporate data.
Cloud Security October 11, 2017 Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption 2 min read - Fail-safe measures such as encryption can help organizations minimize cloud and third-party risks in the virtually inevitable event of a data breach.
August 29, 2017 IBM Announces New Guardium Data Encryption v3.0 Portfolio 2 min read - The latest version of Guardium Data Encryption allows many different types of organizations to protect data by making the data less accessible.
Data Protection August 29, 2017 Need-to-Know Only: Use Encryption to Make Data Meaningless to Prying Eyes 3 min read - Data encryption is one of the most basic — and, given the right tools, most effective — ways to protect sensitive information from cybercriminals.
August 15, 2017 Ex-MI5 Leader Advocates for Strong Encryption to Stave Off Cybersecurity Attacks 2 min read - Former MI5 chief Jonathan Evans told BBC Radio 4 that cybersecurity must be factored in along with counterterrorism in protecting British citizens.