While reports of big health data compromises involving unencrypted computers have been sinking for years, the recent theft of an iPad from a locked storage room - along with the tablet's password - is a reminder that mobile device mishaps can lead to breaches affecting tens of thousands of patients.
Future quantum computers will decrypt encrypted data, so businesses feel pressure to find quantum-resistant security solutions for data transmission. Wells Fargo Bank's Peter Bordow discusses the state of quantum computing, approaches to quantum security, and privacy-enhancing technologies.
The National Institute of Standards and Technology today announced a first group of encryption algorithms designed to withstand the assault of a future quantum computer. Selection of the four algorithms comes after six years of evaluation by the U.S. federal agency.
Businesses want to reduce the complexity associated with encryption and key management in the cloud, according to a survey of more than 2,700 IT professionals conducted by Thales. Todd Moore, the company's vice president, encryption products, addresses the survey's biggest findings and takeaways.
Think your organization is ready to go passwordless? Check out our guide to your passwordless authentication rollout. Learn about the phases of the journey and what your first few weeks might look like.
To achieve transformative business objectives, stay competitive and meet user expectations, enterprises are undergoing a digital transformation, also known as modernization.
This shift to a decentralized, identity-centric operational model has placed increased importance on ensuring secure access for users. The...
Are ransomware-wielding criminals running scared? That's one likely explanation for the sudden release this week of free, master decryption keys for three different strains of formerly prevalent ransomware: Maze, Sekhmet and Egregor.
OMB on Wednesday released a federal strategy to move the U.S. government toward mature zero trust architectures. White House officials say the new strategy - with a focus on MFA, asset inventories, traffic encryption, and more - is a key step in delivering on Biden's May 2021 executive order.
U.S. President Joe Biden today signed a National Security Memorandum that aims to improve the cybersecurity of national security systems. The memo gives new powers to the NSA to oversee cybersecurity improvements such as the use of the multifactor authentication, encryption and endpoint detection services.
In this whitepaper, you'll learn how organizations can confidently move their most mission-critical workloads to a secure, compliant, and reliable cloud with ServiceNow on Microsoft Azure.
While organizations are increasingly adopting data encryption to ensure that data cannot be accessed even if a breach occurs, one challenge remains. Cloud providers often hold the encryption keys for their clients, giving them unfettered access to their data.
Download this eBook and learn how to:
Ensure that...
Enterprises across industry segments are moving IT workloads and functions to the cloud, frequently ahead of any strategy or consistent capability to secure sensitive data. The advantages of cloud migration, such as scale, agility, and consumption-based pricing, are compelling.
This white paper describes the...
Allegiant characterizes itself as more of an e-commerce company than an airline, because 94% of its revenue comes through the website. As such, they needed another level of data security.
Download this case study to learn how Allegiant changed its security practices by:
Deploying Voltage SecureData with Secure...
In a multinational effort led by the Dutch National Police, authorities seized servers and web domains used by DoubleVPN, a Russia-based company that allegedly provided a safe operating infrastructure for cybercriminals, according to Europol.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.