Encryption

Centralised encryption management with Oracle Key Vault
Oracle has introduced Oracle Key Vault as the latest addition to the Oracle Database security portfolio.
How to secure your WiFi network
If you have your own WiFi network, it's important you secure it from unauthorised users and devices by configuring the wireless router appropriately, writes Steve McWhirter of Check Point.
HTTPS: The ‘S’ is more than just a letter
The ‘S’ in HTTPS is more than just a letter: It’s a thin line separating privacy and exposure on the Internet, writes Steve McWhirter of Check Point Software Technologies.
Average of 900 online resources active on Tor daily: Kaspersky
In recent months Kaspersky Lab experts have been closely monitoring so-called Darknet resources, mostly the Tor network, and one thing that is immediately obvious is that the cybercriminal element is growing.
Sophos uses new approach for encryption
Sophos has announced a new approach to data protection with the latest release of Sophos SafeGuard Encryption 6.1, which it said addresses the two biggest issues in encryption – performance and usability.
Silk Road reboots: For real, or just a honeypot?
Silk Road has reportedly reopened, though it is anybody’s guess whether the rebirth of the online drugs and weapons black market is for real, or in fact a honeypot, writes Lisa Vaas.
HITBSecConf: Security is all about mind-games – the good kind
According to Akamai chief security officer (CSO) Andy Ellis, perspective and understanding the motivations of other departments and colleagues is key for any CIO or CSO aiming to gain traction in fulfilling internal security objectives.
Mobile forensics to be shaped by smartphones, tougher encryption
Rising smartphone adoption, uncertain legislation and tougher encryption are among the trends that are going to define the mobile forensics space in the next 12 months, according to Cellebrite, which provides mobile forensic and data transfer solutions.
More companies using encryption to protect sensitive data
Encryption is the fifth most widespread protection technique, according to a survey conducted by B2B International and Kaspersky Lab in July this year – a sharp rise from the results of a similar survey in 2011 where it barely crept into the top 10.
Mathematician unlocks weak domain keys, Google and Microsoft affected
DomainKeys Identified Mail (DKIM) Verifiers have been found to be susceptible to abuse by attackers due to weak encryption, allowing for the spoofing of e-mails from recognized domain names.
Download Digerati50 2020-2021 PDF

Digerati50 2020-2021

Get and download a digital copy of Digerati50 2020-2021