The debate over encryption backdoors is older than you know. Tom Hollingsworth sits down with Joel Fallenstrom of Wickr to discuss where the current thinking is around adding protections and policy for law enforcement. They also discuss how a secured by default platform like Wickr can help create policy for users and information gatherers alike.
Opening backdoors in encryption protocols makes us all safer, right? Or does it actually make us all more vulnerable? Bruce Schneier has a wonderful post on this subject and the coming policy debate.
Encryption is the foundation of our digital age. But what happens when new technology can eliminate the protection of modern cryptography? Tom Hollingsworth takes a look at the solutions that are on the horizon to save us from the coming quantum reckoning.
WPA3 is the new wireless authentication protocol just around the corner. It’s being developed to fix some of the issues with the ancient WPA2 protocol. But what about open encryption? Why don’t we just run everything over SSL and save time? Tom Hollingsworth examines the need for WPA3 with OWE and why TLS alone isn’t going to work.
Data protection can mean making sure you have adequate copies to ensure integrity and uptime. But after Australia passed the Telecommunications Access and Assistance Bill, requiring encryption backdoors, Preston de Guise wonders if it’s possible maintain the privacy function of data protection.
Bruce Schneier breaks down why traditionally encryption may be in trouble once quantum computing becomes a reality, and what security researchers are doing to keep things locked down.
ProtonMail has provided highly secure email, but isn’t the most convenient solution to actually use. With the release of the ProtonMail Bridge, users can now integrate ProtonMail into their mail client of choice.
Malware is a constant battle. And as malware creators find new ways to evade detection with SSL, how can security professionals fight back and save their networks? Tom Hollingsworth takes a look at a solution from Gigamon that gives you the power to see what the bad guys are trying to hide.
Rubrik’s that new backup solution that makes traditional backups a snap – pun intended. I’m a former Systems Administrator and there was absolutely nothing I hated more than managing backup jobs and reviewing why the backups failed all the time. I viewed backups as that thing I had to do each day as fast as possible, so I could get to the interesting parts of being a Systems Administrator like fielding support calls and patching servers. Hey, I was young and it was a phase I was going through, back off.
The writing has been on the wall for SHA-1 for quite some time. The cryptographic hash has been around over a decade now, but organizations have started to move away from it as more sophisticated options became available (SHA-256, SHA-3, etc). Back in 2013, researchers published theoretical approach to generating a collision. Now with the help of Google’s computation grunt and additional resources, were able to actually generate a collision in the wild.