Bill to protect children online ensnared in encryption fight | TheHill – The Hill

Senate legislation to protect children from sexual exploitation online is being dragged into a larger fight over privacy and encryption.

The bill in question, the EARN IT Act, which has bipartisan support, would create a government-backed commission to develop "best practices" for dealing with rampant child sexual abuse material (CSAM) online.

If tech companies do not meet the best practices adopted by Congress, they would be stripped of their legal liability shield, laid out in Section 230 of the Communications Decency Act, in such cases.

But critics worry that the bill is simply a vehicle to block the tech industry's efforts to implement end-to-end encryption, a feature which makes it impossible for companies or government to access private communications between devices.

They worry the legislation could give government a backdoor to encrypted devices. That concern has been amplified by Attorney General William BarrWilliam Pelham BarrThe Hill's Morning Report - Trump takes unexpected step to stem coronavirus Hillicon Valley: House passes key surveillance bill | Paul, Lee urge Trump to kill FISA deal | White House seeks help from tech in coronavirus fight | Dem urges Pence to counter virus misinformation House passes key surveillance bill with deadline looming MORE, vocal opponent of encryption, who would head the best practices commission under the legislation.

Sen. Ron WydenRonald (Ron) Lee WydenDemocrats push for paid leave in coronavirus response Congresspours cold water on Trump's payroll tax cut Senate Democrats pan Trump's payroll tax proposal as 'huge mistake' MORE (D-Ore.) has slammed the bill as a "trojan horse to give Attorney General Barr and Donald TrumpDonald John TrumpThe Hill's Morning Report - Trump takes unexpected step to stem coronavirus Democrats start hinting Sanders should drop out Coronavirus disrupts presidential campaigns MORE the power to control online speech and require government access to every aspect of Americans' lives."

But supporters of the bill are pushing back.

Senate Judiciary Chairman Lindsey GrahamLindsey Olin GrahamMcConnell, top GOP senators throw support behind surveillance deal as deadline looms Congresspours cold water on Trump's payroll tax cut Kennedy backs online child sexual exploitation bill, proposes back up measure MORE (R-S.C.), a bill co-sponsor, said during a hearing before his committee on Wednesday that the legislation is not about the encryption debate, but the best business practices.

This bill is not about ending encryption, added Sen. Richard Blumenthal (D-Conn.), another co-sponsor, Wednesday. And it is also - Im going to be very blunt here - not about the current attorney general, William Barr.

Blumenthal pointed out that the commission would have 19 members and that 14 votes would be needed to approve a best practice. Among those 19 members would be the attorney general, but also the Department of Homeland Security secretary and the chair of the Federal Trade Commission. The other 16 members would be appointed by the Senate majority leader, Senate minority leader, Speaker of the House and the House minority leader.

That has failed to calm the worries of privacy advocates.

Kathleen Ruane, senior legislative counsel at the American Civil Liberties Union, told The Hill that although there are other members on the committee, Barr will have an outsized role. She pointed to language in the bill giving the attorney general final approval power before best practices are sent to Congress.

Blumenthal has said that the attorney general can only reject proposed best practices on the commission, as opposed to pushing any through unilaterally.

Regardless of Barr's role and powers, critics say encryption will come up as the commission debates best practices.

You have law enforcement representatives [on the committee] and this is a huge issue among the law enforcement community... so it's very likely they'll bring it up, said Alan Rozenshtein, associate professor of law at the University of Minnesota and former attorney advisor for the Department of Justice. And then you have victim advocates and to the extent that they believe that encryption is part of the problem or needs to be addressed as part of the problem, they're going to bring it up as well.

"I don't really see a realistic situation in which this does not implicate encryption," he added.

Encryption is not explicitly mentioned in the bill, but that also means nothing stops them from making best practices related to it, said Elizabeth Banker, the deputy general counsel of the Internet Association, a trade association that represents many online companies.

Critics also have broader privacy concerns over the legislation outside of the encryption debate. Ruane said other best practices could pose threats to communication privacy.

One compromise that has been floated is to make it explicit in the legislation that the commission will not make any recommendations about encryption. But Graham has rebuffed that idea.

I'm not going to pre-determine what the right answers are, Graham told reporters Wednesday. Let the commission work.

Other lawmakers have also downplayed any threat to weakening encryption.

I can tell you right now I will not support something that compromises the integrity of encryption for users, because I think that that's hugely significant, Sen. Josh HawleyJoshua (Josh) David HawleyGOP senators introduce bill banning TikTok on government devices The Hill's Morning Report Presented by the APTA Now it's Biden vs. Bernie: no endorsement from Warren Schumer, Roberts clash inflames partisan rift over Supreme Court MORE (R-Mo.), one of the 11 bill co-sponsors, told reporters Wednesday.

Hawley accused tech companies of bringing up the issue of encryption to derail the legislation, which will place more responsibility on them to prevent exploitation of children online.

What the tech companies will do is seize at any straw to try to argue that we just can't possibly revise Section 230, he told reporters. Let's not underestimate how rich they've gotten on Section 230.

Blumenthal said at the hearing that some big tech companies are using encryption as a subterfuge to oppose this bill.

There have been changes to the bill from an earlier version leaked in February. That version had only 15 members on the commission and required a lower threshold to approve best practices.

Asked about those changes, Blumenthal told reporters that legislators were listening for constructive suggestions as they drafted the bill.

As lawmakers move to finalize the bill, both sides are digging in.

I am not going to stand on the sidelines any longer, Graham said Wednesday, vowing to push the legislation forward.

Read the original post:
Bill to protect children online ensnared in encryption fight | TheHill - The Hill

ECS and QuantaNova Announce Sales and Delivery Partnership to Serve Shared Customers with Polymorphic Encryption Products – Benzinga

ARLINGTON, VA / ACCESSWIRE / March 12, 2020 / Today ECS (ASGN) a leading provider of solutions in science, engineering, and advanced technologies across the public and private sectors, and the QuantaNova division of Cipherloc Corporation (OTCQB:CLOK), a developer of advanced encryption technology, announced a go-to-market partnership making ECS an authorized reseller and delivery partner for Cipherloc's entire 2020 catalog of patented and FIPS 140-2 certified cryptographic solutions.

"With the necessary evolution of security compliance requirements, like the latest DoD Cybersecurity Maturity Model Certification (CMMC), it's important for organizations to leverage the latest tools and technology to protect their valuable data," said Steve Hittle, senior Vice President and CIO of ECS. "Our partnership with Cipherloc and their next-gen technology will help strengthen ECS' growing capabilities and toolset, as we tackle our customers' complex security needs."

"Working with ECS for sales and delivery is a major step towards more securely protecting the data that U.S. and allied military, national security, and industrial workforces rely on to keep us safe," said Andrew Borene, CEO of Cipherloc and QuantaNova. "This partnership will allow us to get our patented encryption technology to markets more efficiently and better serve customers today, while improving their ability to manage the unknown risks of tomorrow."

This new partnership will enable delivery of QuantaNova's patented and FIPS 140-2 certified, next-generation encryption technology to shared customers across the U.S. and allied defense, federal civilian, and commercial markets. With an eye towards shifting compliance frameworks and the unknown effects of a post-quantum future, these sectors require solutions that strengthen their current cybersecurity postures through the adoption of truly crypto-agile solutions.

Borene added, "With this partnership, we now have a leading federal systems integrator verifying our go-to-market plan, engaged with us as an authorized reseller of our polymorphic encryption technology. Additionally, ECS is a trusted member of the U.S. defense industrial base and aligns with our mission of putting U.S. and allied customers first."

The reseller agreement gives ECS customers access to all of Cipherloc's patented polymorphic encryption technology, as well as the 2020 catalog of CipherLoc's patented and FIPS 140-2 certified cryptographic module solutions.

About ECS

ECS, a segment of ASGN, delivers advanced solutions in cloud, cybersecurity, artificial intelligence (AI), machine learning (ML), application and IT modernization, science, and engineering. The company solves critical, complex challenges for customers across the U.S. public sector, defense, intelligence, and commercial industries. ECS maintains partnerships with leading cloud, cybersecurity, and AI/ML providers and holds specialized certifications in their technologies. Headquartered in Fairfax, Virginia, ECS has more than 3,000 employees throughout the United States. For more information, visit ECStech.com

About QuantaNova, a division of Cipherloc Corporation

QuantaNova provides advanced technology and expertise to secure your data and safeguard your privacy with the speed you need today and the agility you'll need tomorrow. Our patented polymorphic encryption technology provides a layer of security that is stronger, adaptable, and scalable across a variety of applications and systems. Learn more at http://www.quantanova.com, and view our FIPS 140-2 certification here.

Forward-Looking Statements

This press release contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. All forward-looking statements are inherently uncertain as they are based on current expectations and assumptions concerning future events or future performance of the Company. Readers are cautioned not to place undue reliance on these forward-looking statements, which are only predictions and speak only as of the date hereof. In evaluating such statements, prospective investors should review carefully various risks and uncertainties identified in this release and matters set forth in the Company's SEC filings. These risks and uncertainties could cause the Company's actual results to differ materially from those indicated in the forward-looking statements.

QuantaNova Contact:

Loren MahlerVP, Communications and External Affairs703-201-1692lmahler@cipherloc.net

Cipherloc Investor Contact:

Matt KrepsDarrow Associates, Investor Relations214-597-8200mkreps@darrowir.com

ECS Contact:

Shab NassirpourVP, Marketing and Communications(443) 745-3433Shab.Nassirpour@ecstech.com

SOURCE: Cipherloc Corporation

View source version on accesswire.com: https://www.accesswire.com/580468/ECS-and-QuantaNova-Announce-Sales-and-Delivery-Partnership-to-Serve-Shared-Customers-with-Polymorphic-Encryption-Products

See the rest here:
ECS and QuantaNova Announce Sales and Delivery Partnership to Serve Shared Customers with Polymorphic Encryption Products - Benzinga

Encryption Software Market Insights 2020: strong performance driven due to increase of cyberattacks, report – WhaTech Technology and Markets News

The Objective of the Global Encryption Software Market report is to depict the trends and upcoming for the Encryption Software industry over the forecast years. Encryption Software Market report data has been gathered from industry specialists/experts. Although the market size of the market is studied and predicted from 2019 to 2026 mulling over 2018 as the base year of the market study. Attentiveness for the market has increased in recent decades due to development and improvement in the innovation.

The growing number of data breaches is further boosting the encryption software industry growth, as organizations are focusing on securing the critical data to ensure the privacy of their information. While doing the encryption software market analysis, it is observed that, the targeted attacks on enterprises and their employees are now mainly focused on stealing confidential information from individuals machines or penetrating into networks with the motive of deeper-data thefts.

Thus, adopting encryption technologies are becoming a necessity for the organizations which is driving this market growth. The global encryption software market size is projected to reach $2.66 billion by 2022, growing at a CAGR of 15.0% from 2016 to 2022.

North America is expected to lead the encryption software market share during the forecast period, owing to higher adoption of end-point security solutions among organizations and the prevalence of higher data protection & compliance regulations. However, Asia-Pacific region is anticipated to grow at the fastest rate, due to the growing penetration of cloud computing and increasing workforce mobility.

This report provides a comprehensive analysis of,

Download Sample Report:www.alliedmarketresearch.com/request-sample/1100

Key questions answered in Encryption Software Market research study:

Access Inquiry:www.alliedmarketresearch.com/purchasquiry/1100

Major Key Players:

Similar Reports:

Intelligent Virtual Assistant (IVA) Market is Expected to reach $3.6 Billion by 2020

E-Commerce Logistics Market to Garner $535,895 Million by 2022

This email address is being protected from spambots. You need JavaScript enabled to view it.

See the rest here:
Encryption Software Market Insights 2020: strong performance driven due to increase of cyberattacks, report - WhaTech Technology and Markets News

IoT Security Solution For Encryption Market 2020 By Top Key Players/Manufacturers, Type and Application, Regions, Industry Analysis, Growth, Size,…

The latest research report on the IoT Security Solution For Encryption Market published by Verified Market Research provides a profound awareness of the various market dynamics such as Trends, drivers, challenges and opportunities. The report explains in more detail the micro and macroeconomic elements that are expected to influence the growth of the IoT Security Solution For Encryption Market over the forecast period (2020-2026).

The Global IoT Security Solution For Encryption Market is growing at a faster pace with substantial growth rates over the last few years and is estimated that the market will grow significantly in the forecasted period i.e. 2019 to 2026.

This study highlights the key indicators of market growth that accompany a comprehensive analysis of this value chain, CAGR development, and Porters Five-Force Analysis. This data can enable readers to understand the quantitative growth parameters of this international industry, which is IoT Security Solution For Encryption.

The report also highlights the opportunities and future scope of the IoT Security Solution For Encryption Market on a global and regional level. The study includes a market attractiveness analysis in which the Service is evaluated based on Market Size, Growth Rate and general bioinformatics software industry share.

Segmentation:

The IoT Security Solution For Encryption Market has been divided into several important areas, including applications, types and regions. Each market segment is intensively examined in the report to take into account its market acceptance, value, demand and growth prospects. The segmentation analysis helps the customer to adapt their marketing approach so that they better master each Segment and identify the most potential customer base.

Regional insights into the IoT Security Solution For Encryption market

In terms of Region, this research report covers almost all major regions of the world, such as North America, Europe, South America, the Middle East, Africa and the Asia-Pacific region. Growth is expected for the regions of Europe and North America in the coming years. While the IoT Security Solution For Encryption Market in the regions in the Asia-Pacific region is expected to show remarkable growth in the forecast period. Cutting-edge technology and innovation are the key features of the North America Region, and this is why the US dominates global markets most of the time. The IoT Security Solution For Encryption Market in the South America region is also expected to grow in the near future.

Important questions answered in the report:

What is the main factor that takes this market to the next level?

What will the market demand and what will be growth?

What are the latest opportunities for the IoT Security Solution For Encryption Market in the future?

What are the strengths of the main players?

What is the key to the IoT Security Solution For Encryption Market?

The IoT Security Solution For Encryption Market report provides future growth drivers and the competitive landscape. This will be beneficial for buyers of the market report in order to obtain a clear overview of the important growth and subsequent market strategy. The detailed information on the market will help to monitor future profitability and make important decisions for growth.

Ask for Discount @ https://www.marketresearchintellect.com/ask-for-discount/?rid=170784&utm_source=ME&utm_medium=888

Our study report offers:

Market share analysis for the segments at regional and country level.

Bioinformatics software market share analysis of the best business players.

Strategic proposal for new entrants.

Market forecasts for the next five years of all segments, sub-segments and together of the regional markets.

Market opportunities, Trends, constraints, threats, challenges, drivers, investments, and proposals.

The Strategic Management in key business areas supported the market estimates.

Competitive landscape design that reflects the most important common Trends.

Company identification with careful methods, financial data and previous developments.

Provide chain trends that reflect the most important technological advances of recent times.

The conclusion of the report shows the overall scope of the global IoT Security Solution For Encryption Market in terms of the feasibility of investments in the various market segments, as well as a descriptive Passage describing the feasibility of new projects that could be successful in the market in the near future.

Request Report Customization @ https://www.marketresearchintellect.com/product/global-iot-security-solution-for-encryption-market-size-forecast/?utm_source=ME&utm_medium=888

If you have special requirements, please let us know that we offer you a report according to your wishes.

About Us:

Market Research Intellect provides syndicated and customized research reports to clients from various industries and organizations with the aim of delivering functional expertise. We provide reports for all industries including Energy, Technology, Manufacturing and Construction, Chemicals and Materials, Food and Beverage and more. These reports deliver an in-depth study of the market with industry analysis, market value for regions and countries and trends that are pertinent to the industry.

Contact Us:

Mr. Steven FernandesMarket Research IntellectNew Jersey ( USA )Tel: +1-650-781-4080

Email: [emailprotected]

TAGS: IoT Security Solution For Encryption Market Size, IoT Security Solution For Encryption Market Growth, IoT Security Solution For Encryption Market Forecast, IoT Security Solution For Encryption Market Analysis, IoT Security Solution For Encryption Market Trends, IoT Security Solution For Encryption Market

Follow this link:
IoT Security Solution For Encryption Market 2020 By Top Key Players/Manufacturers, Type and Application, Regions, Industry Analysis, Growth, Size,...

Encryption Key Management Software Market 2020 By Top Key Players/Manufacturers, Type and Application, Regions, Industry Analysis, Growth, Size,…

The latest research report on the Encryption Key Management Software Market published by Verified Market Research provides a profound awareness of the various market dynamics such as Trends, drivers, challenges and opportunities. The report explains in more detail the micro and macroeconomic elements that are expected to influence the growth of the Encryption Key Management Software Market over the forecast period (2020-2026).

The Global Encryption Key Management Software Market is growing at a faster pace with substantial growth rates over the last few years and is estimated that the market will grow significantly in the forecasted period i.e. 2019 to 2026.

This study highlights the key indicators of market growth that accompany a comprehensive analysis of this value chain, CAGR development, and Porters Five-Force Analysis. This data can enable readers to understand the quantitative growth parameters of this international industry, which is Encryption Key Management Software.

The report also highlights the opportunities and future scope of the Encryption Key Management Software Market on a global and regional level. The study includes a market attractiveness analysis in which the Service is evaluated based on Market Size, Growth Rate and general bioinformatics software industry share.

Segmentation:

The Encryption Key Management Software Market has been divided into several important areas, including applications, types and regions. Each market segment is intensively examined in the report to take into account its market acceptance, value, demand and growth prospects. The segmentation analysis helps the customer to adapt their marketing approach so that they better master each Segment and identify the most potential customer base.

Regional insights into the Encryption Key Management Software market

In terms of Region, this research report covers almost all major regions of the world, such as North America, Europe, South America, the Middle East, Africa and the Asia-Pacific region. Growth is expected for the regions of Europe and North America in the coming years. While the Encryption Key Management Software Market in the regions in the Asia-Pacific region is expected to show remarkable growth in the forecast period. Cutting-edge technology and innovation are the key features of the North America Region, and this is why the US dominates global markets most of the time. The Encryption Key Management Software Market in the South America region is also expected to grow in the near future.

Important questions answered in the report:

What is the main factor that takes this market to the next level?

What will the market demand and what will be growth?

What are the latest opportunities for the Encryption Key Management Software Market in the future?

What are the strengths of the main players?

What is the key to the Encryption Key Management Software Market?

The Encryption Key Management Software Market report provides future growth drivers and the competitive landscape. This will be beneficial for buyers of the market report in order to obtain a clear overview of the important growth and subsequent market strategy. The detailed information on the market will help to monitor future profitability and make important decisions for growth.

Ask for Discount @ https://www.marketresearchintellect.com/ask-for-discount/?rid=182608&utm_source=ME&utm_medium=888

Our study report offers:

Market share analysis for the segments at regional and country level.

Bioinformatics software market share analysis of the best business players.

Strategic proposal for new entrants.

Market forecasts for the next five years of all segments, sub-segments and together of the regional markets.

Market opportunities, Trends, constraints, threats, challenges, drivers, investments, and proposals.

The Strategic Management in key business areas supported the market estimates.

Competitive landscape design that reflects the most important common Trends.

Company identification with careful methods, financial data and previous developments.

Provide chain trends that reflect the most important technological advances of recent times.

The conclusion of the report shows the overall scope of the global Encryption Key Management Software Market in terms of the feasibility of investments in the various market segments, as well as a descriptive Passage describing the feasibility of new projects that could be successful in the market in the near future.

Request Report Customization @ https://www.marketresearchintellect.com/product/global-encryption-key-management-software-market-size-forecast/?utm_source=ME&utm_medium=888

If you have special requirements, please let us know that we offer you a report according to your wishes.

About Us:

Market Research Intellect provides syndicated and customized research reports to clients from various industries and organizations with the aim of delivering functional expertise. We provide reports for all industries including Energy, Technology, Manufacturing and Construction, Chemicals and Materials, Food and Beverage and more. These reports deliver an in-depth study of the market with industry analysis, market value for regions and countries and trends that are pertinent to the industry.

Contact Us:

Mr. Steven FernandesMarket Research IntellectNew Jersey ( USA )Tel: +1-650-781-4080

Email: [emailprotected]

TAGS: Encryption Key Management Software Market Size, Encryption Key Management Software Market Growth, Encryption Key Management Software Market Forecast, Encryption Key Management Software Market Analysis, Encryption Key Management Software Market Trends, Encryption Key Management Software Market

Continue reading here:
Encryption Key Management Software Market 2020 By Top Key Players/Manufacturers, Type and Application, Regions, Industry Analysis, Growth, Size,...

‘Crypto’ is deadlong live the digital transaction era – CoinGeek

Using the word crypto to describe Bitcoin is an inaccuracy that comes from early misunderstandings and a false connection to distinctly different systems. As we move into an era where Bitcoin will begin to power the digital transaction economy, its time to let go and use more appropriate terms to describe this industry. So, digital currency it is.

On that note, mining also needs to go. Transaction processors play a far more important role than simply digging up new coins. Mining only applies to the disappearing block subsidy, which is only there to prime the pumpthe true function of the nodes is transaction processing and this takes over as the subsidy dies. No more coal mine stock photos, or gold mining puns in articles, lets give them the respect they deserve.

After 11 years of Bitcoin, were grown accustomed to seeing these expressions. But something never felt quite right about them. They seemed forced, bolted-on, a rushed attempt to describe a new industry using words people could relate to somehow. And over those years, crypto and cryptocurrency have also acquired the stigma of anonymity, crime, and get-rich-quick schemes like ICOs.

Digital transaction and transaction processorsget used to those expressions, because youll be seeing them a lot more often in the future.

Bitcoin is not like this

Bitcoin creator Dr. Craig Wright described the need for more accurate descriptors, saying:

Cryptocurrency is linked to a lot of discredited systems (right back to eCash) that are linked to black market and illegal use cases (drugs, money laundering etc). Next, Bitcoin is not encrypted. Blind cash systems such as Digicash used cryptographic constructs directly and are associated with encrypted transactions that cannot be traced. Bitcoin is not like this.

Bitcoin is sent in clear text. The hash is an index to the identity exchange between peers (people) but nothing is secret. It is private but not hidden.

Theres another, er, key difference. Dr. Wright continued:

With encrypted systems, the loss of the key means the inability to access data. Bitcoin is not encrypted. The transaction is published publicly. So, nothing is going to stop recovery if the nodes agree (nodes enforce rules and courts issue rules).

Even the NSA cannot force access to an encrypted file when the private key is destroyed, but, again Bitcoin is clear text and public. So, losing a key doesnt mean the transaction is lost.

I used digital signature algorithms in bitcoin, but this is still not cryptography. It is a system that uses the same maths in a new manner.

He also noted that Bitcoin was never a new technology. In his 1996 piece, The Wild, Wild Web, Gregory Spears articulated web IPOs, which used tokens to raise funds. We now call these ICOs, but the difference is that a blockchain stops the Ponzi schemes from deleting logs. Dr. Wright said:

Token security offers and capital raising dates back decades. Bitcoin was never a new technology in this area.

In the Nineties

Cryptocurrency is a word that comes from Dr. Wrights favorite decade, the 1990s. Early allusions to the term run alongside untraceable and anonymous moneywhich has shown itself to be undesirable. Interestingly, some of the first published references come from those concerned with investigating its uses. Theres the NSAs How to Make a Mint: the Cryptography of Anonymous Electronic Cash from 1996, also referenced in The American Law Review in 1997.

Its a difficult word to say, and one that causes outsiders eyes to glaze over. If they can relate to it at all, their minds subconsciously connect it to more negative aspects of the past like scams, bubbles, and crime.

Writers also know its a difficult word to type. If you dont believe us, search the web for crypocurrency and crytocurrency and see how many results you get.

We know youll check the whitepaper, so here it is

For the record, Satoshi Nakamotos 2008 Bitcoin whitepaper does not refer to cryptocurrency or miners the way theyre commonly used in todays discourse. There are just two sentences that allude to these terms. This one:

What is needed is an electronic payment system based on cryptographic proof instead of trust

And this one:

The steady addition of a constant of amount of new coins is analogous to gold miners expending resources to add gold to circulation.

Bitcoin is based on cryptography, but it is not itself a form of cryptography and it doesnt function the same way. Contrary to popular belief, it is not secured by cryptography either. Bitcoin has an economic model secured by incentives and coststransaction processors do their job for profit, and hacking or taking over the network is prohibitively expensive.

Cryptographers themselves have never liked the word crypto for digital transaction networks. That abbreviation describes their field, and many have expressed displeasure at it being reapplied to just one specific application. And miners? Like Satoshi said, its only meant to be an analogya comparison to allow newcomers to more easily grasp whats going on.

Were happy for the real cryptographers to have their word back, and restore it to its proper meaning.

Bitcoin and the digital transaction industry are mature now. The industry is ready to move on to greater challenges, and in doing so must discard the expressions that narrowed its mission so much. It gives us great pleasure to announce that crypto is dead long live the digital transaction era.

New to Bitcoin? Check out CoinGeeksBitcoin for Beginnerssection, the ultimate resource guide to learn more about Bitcoinas originally envisioned by Satoshi Nakamotoand blockchain.

See more here:
'Crypto' is deadlong live the digital transaction era - CoinGeek

Disruptive Defenses Are The Key To Preventing Data Breaches – Forbes

A report from DLA Piper states that more than 160,000 data breach notifications have been reported across 28 nations in the European Union since the General Data Protection Regulation (GDPR) went into effect in May 2018 -- an average of more than 260 data breaches per day. And, when you consider that since California's 2004 law on privacy breaches, over 9,000 breaches have been recorded and 11.5 billion records have been exposed,it is evident that threats against sensitive data are unprecedented.

Is this the new normal? Can there be any expectation of security and privacy when even the most stringent of data privacy regulations appear to have little effect?

Companies, government agencies and consumers must change their behavior if they expect to stem this tide. They must adopt disruptive defenses to make it extremely hard for attackers to compromise data.

What is a disruptive defense? It is an uncommon defense, based on existing industry standards, that raises application security to higher levels than what is currently used by most applications.

There are six disruptive defenses that, when deployed, create significant barriers to attackers. They are as follows:

1. Eliminate shared-secret authentication schemes.

This includes passwords, one-time PINs, knowledge-based authentication, etc. This should be replaced with public key cryptography-based authentication that uses cryptographic hardware to protect keys.

Public key cryptography authentication (also known as "strong authentication") does not store secrets on the server. The secret remains with the user, stored in special hardware available on business desktops, laptops, modern mobile phones, smartcards and security keys. This is a modern authentication standard that eliminates passwords and is supported by all major operating systems as well as browsers. According to NIST, it provides the "highest assurance" among authentication technologies currently. Eliminating a 1960s authentication scheme on a 21st-century application should be the first defensive step of every web application.

2. Ensure the provenance of a transaction before it is committed.

This is accomplished through the use of a digital signature on a transaction, applied by the user using the same technology for strong authentication. Not only does this establish an authoritative source for the transaction (since only the user could have applied that digital signature with their consent), but it provides the business with a transaction confirmation, which is becoming increasingly necessary in many business environments.

3. Preserve the confidentiality of sensitive data within the application layer.

This excludes the practice of encrypting data within the database, operating system or disk drive. Encrypting sensitive data has become mandatory via multiple recent regulations. But application developers fool themselves when they use data at rest (data in a database, operating system or disk drive) encryption instead of ensuring that only authorized applications can decrypt sensitive data. Systems are rarely at rest; they're working 24 hours a day and decrypting data for attackers when a legitimate user's password-based credential is compromised. By combining disruptive defenses No. 1 and 3, applications will ensure unauthorized users never get to see decrypted data.

4. Preserve the integrity of a transaction through its lifetime.

This is accomplished, once again, by a digital signature, but it is applied by the application itself. While a digital signature acquired at the source of a transaction guarantees authenticity, transactions are modified in many applications. When data within the transaction changes, a new digital signature must be applied by the application to preserve the integrity of the modified transaction. Verifying the digital signatures of a transaction from its origin to its current state assures applications that unauthorized changes have not been made to data.

5. Use cryptographic hardware wherever cryptographic keys are stored and used.

Cryptography represents the last bastion of defense when protecting sensitive data. As such, cryptographic keys are the only objects standing between an attacker and a major headache for your company. While convenient, keys protected in files are protected by passwords and are subject to the same attacks that compromise user passwords. By using cryptographic hardware -- present in all modern systems -- applications create major barriers to attacks. While it may be argued that cryptographic hardware is also subject to attacks, evidence shows that these attacks are neither scalable nor common, as attackers would need access to the physical computer on which your cryptographic keys are stored to be able to compromise the keys.

6. Ensure cloud applications access cryptographic services from within a secure zone.

While the cloud offers many business benefits, attempting to access cryptographic services from within a public cloud's virtual machine is a recipe for disaster -- the credentials necessary to authenticate to the cryptographic services are vulnerable to compromise in a public virtual machine (as some recent breaches highlight), enabling attackers to use legitimate credentials to command key management systems to decrypt sensitive data for the attacker. Using an application architecture that guarantees access to cryptographic services only from a secure zone eliminates that risk completely.

All these disruptive defenses are based on industry standards and have been around for decades in most cases. Security-conscious professionals recognize protecting data by focusing on system security is a secondary defense; network defenses are generally nonproductive and should be minimized because the use of disruptive defenses assumes an attacker is on the network. The objective, now, is to protect data, even in the presence of this threat.

Visit link:
Disruptive Defenses Are The Key To Preventing Data Breaches - Forbes

Xilinx announces addition to ACAP platform with Versal Premium – Electronics Weekly

Versal is an adaptive compute acceleration platform (ACAP), a heterogeneous compute device with capabilities that the firm claims far exceed those of conventional silicon architectures.

Added to the Premium series are 112Gbps pam4 transceivers, multi-hundred GBe and Interlaken connectivity, cryptography, and PCIe gen5 with built-in DMA, supporting both CCIX and CXL.

Developed on TSMCs 7nm process, Versal Premium combines vector and scalar processing elements, coupled to programmable logic and tied together with a network-on-chip (NoC) which provides memory-mapped access to all three processing element types.

The scalar engines are built from the dual-core Arm Cortex-A72, the adaptable engines are made up of programmable logic and memory cells and the intelligent engines are an array of very long instruction word (VLIW) and single instruction, multiple data (SIMD) processing engines and memories.

The device has over 120TB/s of on-chip memory bandwidth which, coupled with the customizable memory hierarchy, is designed to reduce data movement and remove key bottlenecks, while pre-engineered connectivity and cores allow integration into existing cloud infrastructure.

Versal Premium is designed for high bandwidth networks operating in thermally and spatially constrained environments, as well as for cloud providers. It delivers up to 9Tb/s of serial bandwidth and 5Tb/s of throughput with Ethernet, with flexibility to support various data rates and protocols, the firm says.

Its cryptography engines provide up to 1.6Tb/s of encrypted line rate throughput and support for AES-GCM-256/128, MACsec and IPsec.

The firm suggests the device will find applications in 5G communications, aerospace and defense, along with ADAS.

The Versal Premium series takes ACAPs to the next level delivering breakthrough networked hard IP integration enabling the development of single chip 400G and 800G solutions, says Kirk Saban, vice president of product and platform marketing at Xilinx.

Targeting next-generation networks and cloud deployments, Versal Premium delivers superior bandwidth and compute density in a scalable platform that is readily programmable by hardware and software developers alike for optimized acceleration and reduced TCO.

Link:
Xilinx announces addition to ACAP platform with Versal Premium - Electronics Weekly

5 Actionable Takeaways from Ponemon and KeyFactor’s 2020 PKI Study – Hashed Out by The SSL Store – Hashed Out by The SSL Store

Looking for the latest stats and info about public key infrastructure? Lookno further

74%. Thats how many organizations report not knowing how many keys and certificates they have. This unsettling statistic was reported in the latest data from The Impact of Unsecured Digital Identities, a new public key infrastructure (PKI)-focused research study by the Ponemon Institute and KeyFactor

Last year, KeyFactor and the Ponemon Institute joined forces to publish a study on public key infrastructure. This years publication is chock full of goodies and valuable insights on PKI as a whole. In early March, Chris Hickman, chief security officer at KeyFactor, and Larry Ponemon, chairman and founder of the Ponemon Institute, shared key insights from the study during a webinar. And in this years report, they included something new the Critical Trust Index. This 16-question core competency measurement aims to help businesses measure their certificate management capabilities, the effectiveness of their PKI efforts, and their agility and growth.

Its a great study one well definitely quote cybersecurity statistics from throughout the year. But what makes it so good? The items highlighted in the study are the ones we see every day from our clients across multiple industries both good and bad.

So, what can the results of this study tell you and how canit help you make informed decisions for your own PKI? And who was involved withthe study?

Lets hash it out.

The study, sponsored by our friends at KeyFactor, was independently conducted by the Ponemon Institute, both of which are well-known names within the industry.

The data in the study comes from the survey responses of 603IT and infosec professionals from across North America. The majority of therespondents (61%) reported their positions as supervisor or above and another30% indicated that they are at the staff/technician level. The majority arefrom large Enterprises, with 64% of the respondents indicating that they workfor organizations with at least 5,001 employees.

The participants were asked to respond to a series ofquestions relating to cyber security threats, strategies, budgets, certificatemanagement, compliance, and financial impacts relating to several of theseareas.

From a 30,000-foot perspective, the current mechanisms forsecuring and managing digital certificates and cryptographic keys are lacking.Many companies lack the personnel and technical resources, budgets, procedures,or policies to effectively support public key infrastructure. As such, thisleaves organizations open to significant risks from a variety of cybersecuritythreats the world over.

But no matter how challenging it can be, IT security andinformation security practitioners alike know that public key infrastructure iscritical to organizations. After all, PKI helps organizations to increase trustwith end users and clients (their web browsers) alike through authenticationand encryption. As certificate lifespans shrink and threats continue to evolve,the risk that your organization will be impacted increases with them.

But how important is PKI in the eyes of the C-suite executivesabove them? Lets find out as we glean insights about this topic and othersrelating to the PKI ecosystem.

Perception and reality are frequently two different things this is particularly the case regarding how PKI tasks and IT securitychallenges are handled. Probably the biggest takeaway that the study highlightsthe tremendous gap in perceptions in terms of confidence in the responses toquestions between the technical guardians within an organization and those who areamong the executive leadership above them.

In that data alone, it showed us very significantly how the problems of managing these types of critical assets in the organization, from the practitioners to the executives, differ when asked the same questions, Hickman said in the webinar on the study.

Their observation made them question why theres such adifference in the landscape between these different ranks within anorganization. Executives tend to be significantly more optimistic in theirresponses than their staff/technician counterparts averaging 6.2 on a 1-10scale, versus staff/technicians, who have an average confidence rating of 3.7. Thisis particularly true concerning issues relating to managing critical assets.

These responses demonstrate why challenges might exist withinorganizations leaders think issues are being handled or resolved, andpractitioners are struggling to keep up with the never-ending demands.

As with any organization and tasks, communication is key.There needs to be clear communication and transparency about the situation. Ifthere are deficiencies, insufficient resources, or other challenges, everyoneneeds to be on the same page.

Dont sugar coat things. Be open and honest about PKI and ITsecurity-related issues that exist within your organization. Make yourleadership aware of any challenges and offer recommendations and solutions toaddress the issues. Most importantly: Learn to speak their language.

One suggestion from Hickman and Ponemon shared during the webinar comes from Gartner:

Security leaders that successfully reposition X.509 certificate management to a compelling business story, such as digital business and trust enablement, will increase program success by 60%, up from less than 10% today.

Essentially, executives want to know the bottom line costsinvolved and how circumstances will affect the operation and organization as awhole. Dont speak technical mumbo-jumbo. Give them what they want while stillpushing for the resources you need by changing how you frame the situation.

Listen to your experts. Listen to understand and not to reply. Recognize that theyre humans and that the industry and cyber threats are continually changing. The threats we face today arent necessarily the same as those well face in the future. Be flexible and open to change. If you want to protect your organization, dont put off investing in your cybersecurity infrastructure and resources until tomorrow. Commit to making those changes today.

According to the report, 60% of respondents believe theyhave more than 10,000 certificates in use across their organization. Thats alot of cats to herd. Interestingly, though, the respondents arent all thatconfident in their estimates 74% indicate that they have no clue how manycertificates and keys they actually are using for certain.

So, what do all of these statistics have in common? A lackof certainty (and clarity), for one. Thats because these organizations lackvisibility into their PKI certificate management. Essentially, they dont know:

This lackadaisical approach is kind of like trying to run a restaurant without any clue about whos responsible for what and how its all getting done. For a restaurant to work, you need to know whos ordering the supply deliveries, whos making the food, whether the food thats available to serve to customers meets certain quality and hygienic standards (it hasnt expired), and whos serving it.

If you dont know these things because you lack visibilitywithin your operation, then, frankly, youre not going to be in business forvery long.

Honestly, this finding that organizations have a lack ofvisibility into their PKI doesnt strike me as surprising. After all, a lack ofvisibility is an ongoing issue for many organizations within the industry as awhole and was also an issue in their previous study from 2018. But it doessurprise me a little is that the organizations are willing to admit thatthey lack this visibility and that it continues to be an ongoing issue.

According to their data, 55% of surveyed organizations saidthey had four or more certificate outages over the last 2 years! And 73% saidthat their organizations still experience unplanned downtime and outages due tomismanaged digital certificates.

So, what can done to help you address this lack ofvisibility and poor certificate management within your organization?

Here at Hashed Out, were all about helping our readers avoidcommon PKI certificate management mistakes. One of the things we always emphasizeis the importance of having visibility over your PKI. An issue that many adminshave is that theyre trying to manage their keys and certificates using manualmethods such as Excel spreadsheets. This is not only clunky and cumbersome, butit leads to a variety of issues.

One such example is shadow ITcertificates. If youre not the only person in charge of installing,renewing, and managing X.509 digital certificates, then some certificates canget installed that you dont know about. And certificates that you may haveinstalled yourself may fall through the cracks and expire without yourknowledge. And you cant effectively manage what you dont know you have.

Using a reliable and reputable certificatemanagement solution can help you to avoid this issue. The best certificatemanagement tools enable you to

This provides you with full visibility of your public keyinfrastructure. Considering that many organizations believe they have at least10,000 certificates, you can see how trying to manually manage these assets is virtuallyimpossible.

Manage Digital Certificates like a Boss

14 Certificate Management Best Practices to keep your organization running, secure and fully-compliant.

We get it. Everyones busy and, frankly, there just arentenough hours in the day to handle every task that comes our way. But thatdoesnt change the importance of having a specific team or department thatsresponsible for handling essential tasks.

Despite this need, study respondents indicate that digitalcertificate budgets and responsibility ownership are lacking. The tasks,responsibilities, and budgetary requirements associated with certificatemanagement are often times spread among various departments within differentorganizations. Essentially, theres no clear center of excellence forcryptography.

Their findings also report that nearly just a third (38%) oforganizations claim that their organizations have the human resources dedicatedto their PKI deployment. Part of this might be because of the stagnantcybersecurity budgets in comparison to the industrys growing costs, or itcould be related to the challenges companies report facing in terms of hiringand retaining talent.

Organizations represented in the KeyFactor/Ponemon Institutestudy reported spending only 16% of their budgets on PKI. Thats approximately$3 million from the reported average IT security annual budget of $19.4 million!And they also discovered that the responsibilities and ownership is frequentlyspread among other departments:

In the U.S., were experiencing some of the lowest unemployment levels in more than two decades. The U.S. Bureau of Labor Statistics (BLS) reports that for college grads, the unemployment rate is at 2.0% and 3.8% for high school graduates as of January 2020. Were experiencing the lowest unemployment rates in IT security and technology, which is literally at 0%, according to Cybersecurity Ventures.

While this is great for jobseekers, its not as great fororganizations looking to hire them. Why? Because it would imply that theres agreater demand for skilled workers than there are people looking for jobs. Thismeans that businesses and organizations are competing for talent. So, what canyou do to combat growing workloads when you have static resources?

Some organizations are turning to automation and the use of artificial intelligence (AI). Automation can help reduce the load on your staff and augment their capabilities by eliminating the menial tasks from their workloads. Predictive analytics, language processes, authentication, and log analysis to identify anything unusual. Using AI helps to free up your employees so they can focus some of their attention on higher-level priorities and tasks.

One example of automation in PKI is a certificate management solution. You can use this tool to gain visibility into your PKI and discover shadow certificates. Its also invaluable in terms of helping your team effectively manage all aspects of the certificate lifecycle and avoid certificate expirations, which Gartner estimates can cost an average of $300,000 per hour.

SSL/TLS certificates are a must for any ecommerce business(or any website, really, that wants to rank on Google and other searchengines). And as more organizations readily adopt PKI solutions, it means thereare more keys and digital certificates to manage. Using certificate managementtools and other automation solutions can help you to not only streamline youroperations and make them more effective, but it also helps you to controlrising operational costs.

While certificate outages are a major cause of concern, theresponses received during the study indicate that failed audits due to insufficient key management practices, rogue orcompromised certificate authorities (CA), and misuse of code signingcertificates and keys are even bigger areas of concerns. This is true both interms of financial costs as well as compliance.

The seriousness of failedaudits and compliance headed up the rankings (4.1 on a 1-10 scale where 1 isconsidered a least serious problem and 10 is most serious problem). Inparticular, survey respondents are worried about insufficient or unenforced keymanagement policies and practices. The next most serious issue related toman-in-the-middle (MitM) and phishing attack vulnerabilities that stem from CAcomprormise.

We mentioned earlier that nearly three-quarters (73%) of respondents indicate that they experience unplanned outages and downtime due to mis-managed digital certificates. These occurences are more frequent than unplanned outages that result from certificate expiration. What makes these numbers even more dire is that disruptive outages are expected to keep increasing rather than decreasing. According to the report:

59 percent of respondents say the misuse of keys and certificates by cybercriminals is increasing the need to better secure these critical assets. Yet, more than half (54 percent) of respondents are concerned about their ability to secure keys and certificates throughout all stages of their lifecycle from generation to revocation

If youre using a private CA, its not really surprisingwhen things go sour. One of the best things you can do to avoid issues relatingto rogue or compromised certificate authorities is to work with established,reputable commercial CAs who provide managedPKI services. It would be best to stay away from free PKI certificateproviders because they lack the support and resources that commercial digitalcertificate providers have at their disposal.

The final insight well share from the survey is that respondents concerns stemming from post-quantum cryptography are decreasing for now. The KeyFactor and Ponemon report says:

Only 47 percent of respondents are concerned about the impact that quantum computing will have on their key and certificate management practices, but we expect this number will rise as recent advances in quantum technology bring us closer to the potential breaking point of the keys and algorithms we rely upon today.

Essentially, there is and has been hype surrounding thetopic for several years. But until quantum computing is available at the commerciallevel, well overestimate the potential negative impacts rather than highlightits positive impacts on security, Ponemon said.

Hickman says that quantum computing is our future reality its just a matter of when, not if it will become a thing. Thats why theindustrys work on post-quantum algorithms is critical (see our previousblog post highlighting DigiCerts work on post-quantum cryptography) andwhy organizations need to:

Rarely have we seen something in this industry with thepotential cataclysmic effect of quantum, and the disruptive nature that it willbring from a security standpoint, says Hickman, who emphasizes the importanceof planning, which seems to be taking a back seat in terms of being considereda priority.

Hickman continues:

Having a plan, understanding where your digital assets live, where your cryptography is deployed, having ways to manage that crypto is absolutely important. Things are going to happen along the way such as the deprecation of algorithms But youll be able to reuse that same plan and actually validate it top make sure that youre ready for a post-quantum world.

From these survey responses, its obvious that theres noone clear owner of PKI budgets and efforts with multi-discipline and multi-functionalteams. And theres also no one agreed upon method that these surveyedorganizations rely on to deal with these increasing crypto responsibilities. Butits obvious that having a governance process in place and clear visibility ofyour public key infrastructure are essential to improving a businesss certificatemanagement capabilities. Part of this entails establishing a cryptographiccenter of excellence if one doesnt already exist.

The increasing use of encryption technologies, digital certificates,etc. for compliance with regulations and policies dictates the need for better certificatemanagement practices. And as operational costs continue to increase without a parallelincrease in operating budgets to cover those costs, automation will becomeimportant the closer we get to a PQC world.

Read the original here:
5 Actionable Takeaways from Ponemon and KeyFactor's 2020 PKI Study - Hashed Out by The SSL Store - Hashed Out by The SSL Store

Novel error-correction scheme developed for quantum computers – News – The University of Sydney

Dr Arne Grimsmo from Sydney Nano and the School of Physics. Photo: Stefanie Zingsheim

Scientists in Australia have developed a new approach to reducing the errors that plague experimental quantum computers; a step that could remove a critical roadblock preventing them scaling up to full working machines.

By taking advantage of the infinite geometric space of a particular quantum system made up of bosons, the researchers, led by Dr Arne Grimsmo from the University of Sydney, have developed quantum error correction codes that should reduce the number of physical quantum switches, or qubits, required to scale up these machines to a useful size.

The beauty of these codes is they are platform agnostic and can be developed to work with a wide range of quantum hardware systems, Dr Grimsmo said.

Many different types of bosonic error correction codes have been demonstrated experimentally, such as cat codes and binomial codes, he said. What we have done in our paper is unify these and other codes into a common framework.

The research, published this week in Physical Review X, was jointly written with Dr Joshua Combes from the University of Queensland and Dr Ben Baragiola from RMIT University. The collaboration is across two leading quantum research centres in Australia, the ARC Centre of Excellence for Engineered Quantum Machines and the ARC Centre of Excellence for Quantum Computation and Communication Technology.

Our hope is that the robustness offered by spacing things out in an infinite Hilbert space gives you a qubit that is very robust, because it can tolerate common errors like photon loss, said Dr Grimsmo from the University of Sydney Nano Institute and School of Physics.

Scientists in universities and at tech companies across the planet are working towards building a universal, fault-tolerant quantum computer. The great promise of these devices is that they could be used to solve problems beyond the reach of classical supercomputers in fields as varied as materials science, drug discovery and security and cryptography.

With Google last year declaring it has a machine that has achieved quantum supremacy performing an arguably useless task but beyond the scope of a classical computer interest in the field of quantum computing and engineering continues to rise.

But to build a quantum machine that can do anything useful will require thousands, if not millions of quantum bits operating without being overwhelmed with errors.

And qubits are, by their very nature, error prone. The quantumness that allows them to perform a completely different type of computing operation means they are highly fragile and susceptible to electromagnetic and other interference.

Identifying, removing and reducing errors in quantum computation is one of the central tasks facing physicists working in this field.

Quantum computers perform their tasks by encoding information utilising quantum superposition a fundamental facet of nature where a final outcome of a physical system is unresolved until it is measured. Until that point, the information exists in a state of multiple possible outcomes.

Dr Grimsmo said: One of the most fundamental challenges for realising quantum computers is the fragile nature of quantum superpositions. Fortunately, it ispossible to overcome this issue using quantum error correction.

This is done by encoding information redundantly, allowing the correction of errors as they happenduring a quantum computation. The standard approach to achieve this is to use a large number of distinguishable particles asinformation carriers. Common examples are arrays of electrons, trapped ions or quantum electrical circuits.

However, this creates a large network of physical qubits in order to operate a single, logical qubit that does the processing work you require.

This need to create a large network of physical qubits to support the work of a single operating qubit is a non-trivial barrier towards constructing large-scale quantum machines.

Dr Grimsmo said: In this work, we consider analternative approach based on encoding quantum information in collections of bosons. The most common type of boson is the photon, a packet of electromagnetic energy and massless light particle.

By trapping bosons in a particular microwave or optical cavity, they become indistinguishable from one another, unlike, say, an array of trapped ions, which are identifiable by their location.

Theadvantage of this approach is that large numbers of bosons can be trapped in a single quantum system such as photons trappedin a high-quality optical or microwave cavity, Dr Grimsmo said. This could drastically reduce the number of physical systems required to build a quantum computer.

The researchers hope their foundational work will help build a roadmap towards fault tolerance in quantum computing.

Go here to see the original:
Novel error-correction scheme developed for quantum computers - News - The University of Sydney