What time is it? Pretty easy question, right? But what if you need to know exactly what time something was sent or received? And you needed to trust someone else to give you that information. RFC3161 covers this in detail, but how does it really work? Chris Marget tells you all about Trusted Time Protocol in this great post.
Less than 10% of cloud data is encrypted at rest. With CCPA coming soon, what does that mean for your company if you violate the act and it comes back to haunt you? How can you be sure your data is worthless to thieves? Tom Hollingsworth sits down with Ed Yu of StrongSalt and discusses their new Open Privacy API, which is designed to combat the difficulty of implementing encryption properly.
The debate over encryption backdoors is older than you know. Tom Hollingsworth sits down with Joel Fallenstrom of Wickr to discuss where the current thinking is around adding protections and policy for law enforcement. They also discuss how a secured by default platform like Wickr can help create policy for users and information gatherers alike.
Opening backdoors in encryption protocols makes us all safer, right? Or does it actually make us all more vulnerable? Bruce Schneier has a wonderful post on this subject and the coming policy debate.
Encryption is the foundation of our digital age. But what happens when new technology can eliminate the protection of modern cryptography? Tom Hollingsworth takes a look at the solutions that are on the horizon to save us from the coming quantum reckoning.
WPA3 is the new wireless authentication protocol just around the corner. It’s being developed to fix some of the issues with the ancient WPA2 protocol. But what about open encryption? Why don’t we just run everything over SSL and save time? Tom Hollingsworth examines the need for WPA3 with OWE and why TLS alone isn’t going to work.
Data protection can mean making sure you have adequate copies to ensure integrity and uptime. But after Australia passed the Telecommunications Access and Assistance Bill, requiring encryption backdoors, Preston de Guise wonders if it’s possible maintain the privacy function of data protection.
Bruce Schneier breaks down why traditionally encryption may be in trouble once quantum computing becomes a reality, and what security researchers are doing to keep things locked down.
ProtonMail has provided highly secure email, but isn’t the most convenient solution to actually use. With the release of the ProtonMail Bridge, users can now integrate ProtonMail into their mail client of choice.
Malware is a constant battle. And as malware creators find new ways to evade detection with SSL, how can security professionals fight back and save their networks? Tom Hollingsworth takes a look at a solution from Gigamon that gives you the power to see what the bad guys are trying to hide.