Security
This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.
Next-Gen Encryption to Confront Next-Gen Threats
New hacking tools and techniques are on the verge of breaking even the most hardened data protection capabilities of today. Fortunately,...
Art Museums and Blockchain: What's the Connection?
While some technologies exacerbate the problem of fake art on the market, another technology advancement may solve it. Blockchain has...
Cybersecurity Concerns Rise for Remote Work
Being proactive about cybersecurity for remote work will pay off in averting data breaches and headaches down the road.
3 Identity and Access Management Trends for 2020
The challenges in 2020 and beyond that Identity and Access Management addresses may turn out to be footnotes — or may change the way we...
Encryption Vs. Law Enforcement (And How It Affects Your Privacy Rights)
Could creating a backdoor or skeleton key for law enforcement create more problems than it solves? Learn how encryption affects privacy...
Biometrics: Moving Forward with Password-Free Security
With large numbers and cases of security breaches affecting the world, it's obvious that we need to find more secure solutions other than...
Key Management: Healthcare's Secret Ingredient for Better Encryption
Proper data protection is a must for any enterprise, but in the healthcare industry it can become a matter of life and death.
Job Role: Cryptographer
Cryptography is a game that everyone has to play — and it’s still evolving in the age of quantum computing and AI.
Quantum Cryptography Vs. Quantum Hacking: A Cat and Mouse Game
As quantum technology becomes a reality, this cybersecurity quandary has become a true cat vs. mouse game. It’s too early to predict how...
Biometrics: New Advances Worth Paying Attention To
What's happening in the field of biometrics? Some people would say: not much. Some others, who are closer to the industry, would say a lot...
Encryption Vs. Decryption: What's the Difference?
In truth, encryption is rooted in practices that date back thousands of years. The technology and codes have changed, but some of the...
Expert Feedback: What Data Encryption Advancements Should Businesses Be Aware Of?
Since cyberattacks have ramped up over the past few years, data encryption needs to keep pace. But what advancements should be considered...
Encryption Backdoors: The Achilles Heel to Cybersecurity?
Encryption backdoors will clearly and overwhelmingly jeopardize the privacy and security of everyone. The government should ponder on the...
Cybersecurity and Infrastructure: Current Trends and Future Developments
New cyberthreats are emerging in infrastructure with broad opportunities being brought forward by increased connectivity.
Cryptography: Understanding Its Not-So-Secret Importance to Your Business
Modern cybercriminals are becoming more aggressive every day, but they're not the only prying eyes trying to spy on your data
How This Museum Keeps the Oldest Functioning Computer Running
The National Museum of Computing needs to track the continuous health of important technological artifacts before disaster strikes—they...
Massive Data Breaches: The Truth You Might Not Know About
Learn the truth of what actually happens in those massive data breaches that claim millions, even billions, of user IDs were sucked into...
Privacy Compliance: Gearing Up for 2020
Data privacy advocates succeeded in pushing for regulations in the EU in the form of GDPR. On the other side of the Atlantic, individual...
6 Cybersecurity Predictions for 2020
One of the major cyber security predictions for 2020 is that there will be a rise in ransomware attacks; not just your average ransomware...