What is encryption? – Fox Business

U.S. Attorney General William Barr discusses human traffickers use of encrypted data and the work he is doing to fight it.

What is encryption?

Encryption is a function on certain apps and devices that allows users to send and receiveprivatemessages.

End-to-end encryption allows people to communicate with each other on certain apps or devices without worrying aboutdevelopers andother third parties like hackers or law enforcement having access to those messages.

WHAT ARE THE TOP-RATED ENCRYPTED TEXTING APPS?

How does encryption work?

Cybersecurity infrastructure company Cloudfare explains encryption as a way of scrambling plain text into a kind of unreadable language.

Encryption "is the process of converting plaintext to ciphertext. In simpler terms, encryption takes readable data and alters it so that it appears random. Encryption requires the use of an encryption key: a set of mathematical values that both the sender and the recipient of an encrypted message know," Cloudfare's website reads.

POPULAR CHAT APP ACCUSED OF BEING SECRET SPY FOR UAE

Why is encryption controversial?

Encryptedmessagingapps, devicesanddigital privacyin generalare in high demand in this era ofbig techand heightenedcybercrimecapabilities. Part of the reason Apple's iPhones are so popular is because they are encrypted, whereas some other popular smartphones are not.

EXPERTS SAY IPHONES ARE EASY TO UNLOCK, SO WHY IS THE FBI DEMANDING APPLE'S HELP?

On the other hand, encryption has become a hot topic of debate in Congress sincebecause a number of cybercriminals have taken advantage of the privacy that apps like Facebook Messenger and WhatsAppoffer through encryption technology. Encryption makes it harder for law enforcement to identify human traffickers and other criminals who communicate through those apps.

A customer compares her iPhone 6, left, with an iPhone 7 at an Apple Store in Chicago. (AP Photo/Kiichiro Sato, File)

The New York Times, for example, published a comprehensive report on the child sex abuse and human trafficking that takes place on encrypted messaging apps such as Messenger. The report notes that Messenger only became encrypted after Facebook came under pressure for not taking privacy seriously.

POPULAR CHAT APP ACCUSED OF BEING SECRET SPY FOR UAE

"Facebook announced in Marchplans to encrypt Messenger, which last year was responsible for nearly 12 million of the 18.4 million worldwide reports of child sexual abuse material, according to people familiar with the reports," the report reads.

There are companies around the world that offer encryption-breaking services that can take anywhere from days to months to crack a code and access information on an app or device.Graykey and Cellebrite, for example, offer encryption-breaking services exclusively to the government and law enforcement.

READ MORE ON FOX BUSINESS BY CLICKING HERE

This report contains material from a previous FOX Business post.

See original here:
What is encryption? - Fox Business

Encryption is finally being used primarily to protect personal data rather than just for compliance – Help Net Security

As organizations accelerate digital initiatives such as cloud and the IoT, and data volumes and types continue to rise, IT professionals cite protection of customer personal information as their number one priority, according to nCipher Security and the Ponemon Institute.

For the first time, protecting consumer personal information is the top driver for deploying encryption (54% of respondents), outranking compliance, which ranked fourth (47%).

Traditionally compliance with regulations was the top driver for deploying encryption, but has dropped in priority since 2017, indicating that encryption is transitioning from a requirement to a proactive choice to safeguard critical information.

Employee mistakes continue to be the biggest threat to sensitive data (54%) and significantly outweigh concerns over attacks by hackers (29%), or malicious insiders (20%). In contrast, the least significant threats cited include government eavesdropping (11%) and lawful data requests (12%).

With the proliferation of data from digital initiatives, cloud use, mobility, IoT devices and the advent of 5G networks, data discovery continues to be the biggest challenge in planning and executing a data encryption strategy, with 67% of respondents citing this as their top concern. And that is likely to increase, with a pandemic-driven surge in employees working remotely, using data at home, creating extra copies on personal devices and cloud storage.

The study indicates that 48% of organizations have adopted encryption strategies across their enterprises, up from 45% in 2019. With encryption deployment steadily growing, how are organizations looking ahead? In the near term, 60% of organizations plan to use blockchain, with cryptocurrency/wallets, asset transactions, identity, supply chain and smart contracts cited at the top use cases.

Other much-hyped technologies are not on IT organizations near-term radar. Most IT professionals see the mainstream adoption of multi-party computation at least five years away, with mainstream adoption of homomorphic encryption more than six years away, and quantum resistant algorithms over eight years out.

The use of hardware security modules (HSMs) continues to grow, with 48% of respondents deploying HSMs to provide a hardened, tamper-resistant environment with higher levels of trust, integrity and control for both data and applications.

Organizations in Germany, the United States and Middle East are more likely to deploy HSMs, with Australia, Germany and the United States most likely to assign importance to HSMs as part of their organizations encryption or key management activities.

HSM usage is no longer limited to traditional use cases such as public key infrastructure (PKI), databases, application and network encryption (TLS/SSL).

The demand for trusted encryption for new digital initiatives has driven significant HSM growth for big data encryption (up 17%) code signing (up 12%), IoT root of trust (up 10%) and document signing (up 7%). Additionally, 35% of respondents report using HSMs to secure access to public cloud applications.

Eighty-three percent of respondents report transferring sensitive data to the cloud, or planning to do so within the next 12 to 24 months, with organizations in the United States, Brazil, Germany, India and South Korea doing so most frequently.

In the next 12 months, respondents predict a significant increase in the ownership and operation of HSMs to generate and manage Bring Your Own Key (BYOK), and integration with a Cloud Access Security Broker (CASB) to manage keys and cryptographic operations. The survey found that the most important cloud encryption features are:

Consumers expect brands to keep their data safe from breaches and have their best interests at heart. The survey found that IT leaders are taking this seriously, with protection of consumer data cited as the top driver of encryption growth for the first time, says Dr Larry Ponemon, chairman and founder of Ponemon Institute.

Encryption use is at an all-time high with 48% of respondents this year saying their organization has an overall encryption plan applied consistently across the entire enterprise, and a further 39% having a limited plan or strategy applied to certain application and data types.

As the world goes digital, the impact of the global pandemic highlights how security and identity have become critical for organizations and individuals both at work and at home, says John Grimm vice president of strategy at nCipher Security.

Organizations are under relentless pressure to deliver high security and seamless access protecting their customer data, business critical information and applications while ensuring business continuity.

See more here:
Encryption is finally being used primarily to protect personal data rather than just for compliance - Help Net Security

Zoom admits confusion over its promise of end-to-end encryption – IT World Canada

The chief product officer of video conference provider Zoom has apologized for any confusion about its encryption capability after a news service this week complained the company is misleading users by saying it offers end-to-end encryption.

While we never intended to deceive any of our customers, we recognize that there is a discrepancy between the commonly accepted definition of end-to-end encryption and how we were using it, Oded Gal said in a blog Thursday.

In a separate blog CEO Eric Yuan said we recognize that we have fallen short of the communitys and our own privacy and security expectations. For that, I am deeply sorry.

Recently Zoom has improved privacy by removing an attendee attention tracker feature, releasing fixes for both Mac-related issues first raised by Motherboard recently, and releasing a fix for a UNC link issue identified by Bleeping Computer. It also removed the LinkedIn Sales Navigator app after identifying unnecessary data disclosure by the feature.

He also said Zoom over the next three months will shift all of its software engineering resources to focus on trust, safety and privacy issues, as well as conducta comprehensive review with third-party experts and representative users to understand and ensure the security of all of our new consumer use cases.

Their statements came after The Intercept reportedin marketing material Zoom says it offers end-to-end encryption for internet audio and video connections (but not dial-in phone audio), giving the impression that no one can intercept web-based sessions. But, says the story, what Zoom really provides is TLS or transport encryption the same encryption web servers use to secure HTTPS websites. That, in theory, means Zoom could access unencrypted video and audio from meetings, say experts interviewed in the article.

By contrast, says The Intercept, the Signal messaging app service which promises end to end encryption doesnt have the keys for decrypting messages and therefore cant access content.

Privacy issues have become more important due to the COVID-19 pandemic crisis with more organizations and individuals using audio and video conferencing. Zoom alone has seen the maximum number of daily meeting participants, both free and paid, conducted on its platform rise from approximately 10 million sessions at the end of December to more than 200 million daily meeting participants, both free and paid last month.

Gal admitted there has been confusion we have caused by incorrectly suggesting that Zoom meetings were capable of using end-to-end encryption. He then goes on to give a detailed explanation of the companys privacy protocols

In a meeting where all of the participants are using Zoom clients, and the meeting is not being recorded, we encrypt all video, audio, screen sharing, and chat content at the sending client, and do not decrypt it at any point before it reaches the receiving clients.

Zoom has never built a mechanism to decrypt live meetings for lawful intercept purposes, nor do we have means to insert our employees or others into meetings without being reflected in the participant list.

Where all participants are using the Zoom app on a computer or smartphone or in a Zoom Room no user content is available to Zooms servers or employees at any point during the transmission process, he wrote.

Audio is not encrypted with the Zoom system for users who join Zoom meetings on a traditional telephone line or through SIP/H.323 room-based conferencing systems, Gal said. However, specialized clients called Zoom Connectors to translate between Zoom encrypted meetings and legacy systems. These connectors are effectively Zoom clients that operate in Zooms cloud. Content remains encrypted to each connector, and when possible we will encrypt data between each connector and the eventual destination (such as a non-Zoom room system), Gal wrote. To ensure this entire process [the web-based conferencing and the Connectors system] meets the needs of our customers around the clock and around the world, Zoom currently maintains the key management system for these systems in the cloud. Importantly, Zoom has implemented robust and validated internal controls to prevent unauthorized access to any content that users share during meetings, including but not limited to the video, audio, and chat content of those meetings.

For those who want additional control of their keys, Gal noted, Zoom still offers an on-premise solution. Later this year a solution will be offered to allow organizations to use Zooms cloud infrastructure but host the key management system within their environment. Additionally, enterprise customers have the option to run certain versions of our connectors within their own data centers if they would like to manage the decryption and translation process themselves.

The Intercepts article captured headlines and several security researchers have noted a rise in the number of posts in hacking forums with tips on exchanging Zoom conferencing codes and ways to disrupt meetings. However, at least one expert suggested CISOs and individuals have more serious threats to worry about.

Few attackers will ever bother to intercept Zoom communications, said Ilia Kolochenko, founder and CEO of web security company ImmuniWeb, Even fewer will extract any value from the alleged data sharing with Facebook. Instead, they will bet on the skyrocketing number of poorly configured VPNs and RDP technologies, abandoned servers and unprotected cloud storage, exposed databases and shadow IT resources that widely open the door to companies crown jewels. Others will hone their skills in large-scale phishing and BEC campaigns. Unfortunately, most of their attacks will likely be tremendously successful.

See more here:
Zoom admits confusion over its promise of end-to-end encryption - IT World Canada

Cyber Attack Prevention Can Save Businesses Up to $1.4M Per Attack – Hashed Out by The SSL Store – Hashed Out by The SSL Store

While that headline sounds great, research from a study by the PonemonInstitute and Deep Instinct shows that 76% of surveyed security professionals indicatethat cyber attack prevention is too difficult for their organizations toachieve and instead focus on easier detection and containment efforts

It sounds like a bad joke: Why did the security department giveup on their cyber attack prevention and mitigation efforts? Becausepreventions too hard to achieve.

Unfortunately, though, this is not just a bad joke. According to research from a new study that was released today by the Ponemon Institute and Deep Instinct, thats exactly what more than three-quarters of survey respondents said they believe. The unsettling data indicates that 40% they strongly agree and another 36% said they agree with the statement that My organization focuses on the detection of cyberattacks because prevention is perceived to be too difficult to achieve.

Were not here to argue the psychological semantics ofperception versus reality but we are saying that this data shows thatperceptions relating to the cybersecurity lifecycle do matter (particularlywhere an organizations resource allocation and budgetary decisions areconcerned).

To better understand the data, were going to dive into theresults of this survey, which focuses on the responses to questions relating toperceptions of the cybersecurity lifecycle and the economic value of preventionefforts.

Lets hash it out.

The study takes a deep dive into the economic impact ofcosts associated with cyber attacks on organizations. But well get more into whothe survey respondents are later lets get to the meat of what they wereasked about The cybersecurity lifecycle itself and the ways that theirorganizations prevent cyber attacks.

The lifecycle represents a series of cybersecurity-relatedprocesses an organization goes through when identifying and responding tovirtually any type of cyber attack. So, what are the five phases?

The survey asked participants to estimate the costs associated with five types of attacks zero-day, phishing, nation-state, ransomware, and spyware and the percentage of the cost thats associated with each of those lifecycle phases. For example, their data shows that a single phishing attack could cost an average of $832,500 due to costs associated with detection, containment, recovery, and remediation efforts. But if an organization was able to prevent the attack in the first place, they could save $682,650 of those total costs!

Why only 82% wouldnt it prevent 100% of the costs of acyber attack? Well, no. Thats because there are costs associated with cyberattack prevention initiatives in terms of the human and technological resourcesthat are involved.

So, ask yourself: If there is a chance that you could potentiallysave your organization 82% of the costs it could face by preventing an attack fromhappening in the first place, would you put the necessary resources in place todo it? Where do you and your organization stand on this particular issue areyou in the camp that supports focusing more of your efforts on prevention, ordo you believe more resources should be dedicated to detection and containment?

Unsurprisingly, the survey finds that preventing attacksfrom causing damage not only protects an organizations reputation, but it alsosaves them time, resources, and money. That seems like pretty common senseto me. But what was surprising was the weight given to perceptionssurrounding the topics of cyber attack detection and prevention. Herein liesthe issue.

As we mentioned earlier, the majority of survey respondentscybersecurity resources appear to be devoted significantly more to respondingto threats (containment) than stopping them from occurring in the first place(prevention). In fact, only 24% say that they focus on optimizing theirprevention capabilities!

But what leads to such a big discrepancy in priorities?

Dr. Larry Ponemon, the chairmanand founder of the Ponemon Institute, was quoted in the press release as sayingthat the reason seems to boil down to perceptions of accountability:

This study shows that the majority of companies are more effective at containing cyberattacks after they happen because it is perceived to be more accountable. This explains why cybersecurity budgets focus on containing attacks rather than preventing them, as well as the increased rate of breaches despite investments in cybersecurity solutions.

Prevention of cyberattacks is perceived to be too difficult, but as companies continue to suffer revenue losses due to cyber breaches, we expect budgets to start allocating increased resources to preventative solutions given the amount of money they save.

If youwant to ensure that your budget money is best spent, then its imperative forbusinesses and organizations to dedicate more of their moolah to cyber attackprevention initiatives, personnel resources, and technologies. But even withincreased resources, that doesnt mean that your cyber security prevention effortswill be without challenges.

When it comes to figuring out how to prevent a cyber attack, its all about identifying and stopping any type of malicious threat in real time, regardless of the types of files that are used in the attack or if its a zero-footprint attack (one that lacks files).

The fivetypes of cyber attacks we mentioned earlier zero-day, phishing nation-state,ransomware, and spyware were among those that the survey respondents foundvery difficult to prevent. According to the research, a few reasons reallystand out about why almost 80% of the survey respondents feel like preventingthese types of cyber attacks is too difficult:

So, evenif it is harder and more challenging to prevent attacks than to detect andcontain them, its still worth the effort to do what you can to prevent themfrom happening. Having the right tools and technologies in place is especiallyuseful and is among the best ways to prevent cyber attacks. Using encryptionand authentication technologies, in addition to automation and AI, isdefinitely one of the best approaches and should be part of a larger cyberattack prevention strategy.

Something that always interests us in these types ofarticles is where public key infrastructure (PKI) and encryption fall withinthe purview of necessity.

On a scale of 1-5, with 5 meaning very high impact and 1 meaning very low impact, public key infrastructure (PKI) has an impact score of 3.9 in terms of how well it helps to prevent cyber attacks. This tied PKI with privileged access management (PAM). This is behind only a few others:

This means that while PKI isnt the top contributingfactor, it is one of the most valuable technologies that organizations areputting to use. Although this is something we already knew in terms of theimportance of PKI, its nice to see what we proclaim being validated by otherreputable organizations.

Digital certificate management also made the listwith an impact rating of 3.6. Well get more to the importance of thatmomentary. But, first, lets keep going with the benefits of having awell-established PKI and how it helps you prevent cybersecurity attacks.

Public key infrastructure is the framework, technologies,processes, and other integral components that are required for issuing, using,and managing public key encryption certificates. This infrastructure involvesweb browsers, certificate authorities (CAs), X.509 digital certificates, and theirpublic/private keys.

But how does PKI play a role in preventing cyber attacks? Publickey encryption does two things exceptionally well:

When asked which types of solutions they currently use toprevent cyber attacks, encryption is one of the top solutions listed.Encryption is important and is already in use in various ways in manybusinesses around the globe. For example, data in transit encryption is used onmany businesses website servers. Some businesses also use encryption to securetheir IoT devices, email servers, and the email communications of specificusers. However, it doesnt appear to be as widespread as wed like yet in termsof protecting mobile devices.

The survey data indicates that only 39% of organizationsreportedly take steps to protect data on employees mobile devices. Of thoserespondents, 41% say their organizations use data in transit and at restencryption to secure data both while it is stored and being transmitted.

This is definitely an area that can use some improvement.This is especially true considering that the survey respondents also indicatethat more than half (54%) say their organizations allow them to use theirpersonal mobile devices in the workplace and 41% say they use the devices forwork purposes.

When talking about email security, phishing is a majorconcern for every business. All it takes it for one email to be successful forall of your good intentions, resources, and hard work to go out the window.

The FBIs 2019 Internet Crime Report also indicates that email is among the most common entry points for fraud. According to the Ponemon/Deep Instinct survey, 79% of the respondents indicate that their organizations experienced at least one phishing attack. Of those, only 18% said that they were able to prevent them.

Of course, this is where cyber awareness training and theuse of digital signatures can really have an impact. For example, if youremployees are aware of the threats that exist with regard to phishing emailsand social engineering attacks, theyll be less likely to fall for those typesof scams.

However, if their organizations also implement the use ofdigital signatures via email signing certificates, it could help emailrecipients more easily verify whether an email came from a legitimate person oran imposter.

Managing your digital certificates is a critical task thatmust be done effectively. This means that you need to have strong visibilitywithin your network and IT infrastructure to know what you have and whetherits protected. Having unknown certificates (shadow IT) and expiredcertificates can lead to a variety of costly headaches for your team and yourorganization as a whole.

For example, outages that result from certificate expirations can cost organizations more than $11.1 million, according to research from another Ponemon Institute report (sponsored by KeyFactor). Some of the resulting issues include:

So, how do you manage all of these certificates to ensurethat this doesnt happen at your organization? And what other solutions can youuse to streamline your cyber security efforts and prevent cyber attacks?

More than two-thirds (67%) of the surveys respondents believe that automation, artificial intelligence (AI), and other advanced technologies can help to prevent cyber attacks. This makes sense in many ways computers are capable of scanning and analyzing logs and records faster than any human would ever be capable of doing. Furthermore, humans are more likely to make errors than machines and may forget to perform essential tasks.

The use of AI and machine learning-based solutions isntabout machines replacing humans. Its about augmenting our practitionerscapabilities and reducing some of the strain thats placed upon them each day.Part of this involves removing menial tasks from their workload that can beautomated. Another part is taking advantage of the vast processing andanalytical capabilities of AI to teach it to identify and recognize threats andattacks more quickly even those that have before been seen.

So, what are some of the reasons whyautomation and learning-based solutions should be implemented?

Manage Digital Certificates like a Boss

14 Certificate Management Best Practices to keep your organization running, secure and fully-compliant.

The survey focuses on the responses of more than 634cybersecurity and IT professionals to questions relating to the following five overarchingphases of the cybersecurity lifecycle. Of those respondents, 24% were ITmanagement professionals and 18% work in the financial services sector.

This study highlights a key opportunity forcybersecurity-savvy companies. By focusing more of their budget and resourceson cyber attack prevention, they can save significant costs, while protectingtheir reputation and business. Key attack prevention tactics include (but arenot limited to):

See the original post:
Cyber Attack Prevention Can Save Businesses Up to $1.4M Per Attack - Hashed Out by The SSL Store - Hashed Out by The SSL Store

Optical Encryption Market Insights, Growth Forecast to 2024 – Express Journal

The Optical Encryption market report provides a detailed analysis of this business space. The market is analyzed in terms of production as well as consumption. Based on the production aspect, the report includes particulars pertaining to the manufacturing processes of the product, alongside revenue and gross margins of the respective manufacturers. The unit cost decided by the producers across various regions during the forecast period is also included in the report.

Additionally, the study comprises of insights regarding the consumption pattern. Information concerning the product consumption volume and product consumption value is mentioned in the document. The individual sale price along with the status of the export and import graphs across various regions are provided. Meanwhile, an in-depth analysis of the production and consumption patterns during the estimated timeframe has been given.

A summary of the geographical landscape:

Request Sample Copy of this Report @ https://www.express-journal.com/request-sample/36866

An overview of the product landscape:

An outline of the application spectrum:

A gist of the competitive landscape:

In a nutshell, the Optical Encryption market report encompasses details about the equipment, downstream buyers and upstream raw materials. Growth factors impacting this industry vertical in consort with the marketing strategies implemented by the manufacturers have been analyzed and provided in the research report. The Optical Encryption market study report also offers insights regarding the feasibility of new investment projects.

Report Objectives:

Request Customization on This Report @ https://www.express-journal.com/request-for-customization/36866

Read the rest here:
Optical Encryption Market Insights, Growth Forecast to 2024 - Express Journal

Data Encryption Service Market Size Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026 – Science In Me

New Jersey, United States: Market Research Intellect has added a new research report titled, Data Encryption Service Market Professional Survey Report 2020 to its vast collection of research reports. The Data Encryption Service market is expected to grow positively for the next five years 2020-2026.

The Data Encryption Service market report studies past factors that helped the market to grow as well as, the ones hampering the market potential. This report also presents facts on historical data from 2011 to 2019 and forecasts until 2026, which makes it a valuable source of information for all the individuals and industries around the world. This report gives relevant market information in readily accessible documents with clearly presented graphs and statistics. This report also includes views of various industry executives, analysts, consultants, and marketing, sales, and product managers.

Market Segment as follows:

The global Data Encryption Service Market report highly focuses on key industry players to identify the potential growth opportunities, along with the increased marketing activities is projected to accelerate market growth throughout the forecast period. Additionally, the market is expected to grow immensely throughout the forecast period owing to some primary factors fuelling the growth of this global market. Finally, the report provides detailed profile and data information analysis of leading Data Encryption Service company.

Data Encryption Service Market by Regional Segments:

The chapter on regional segmentation describes the regional aspects of the Data Encryption Service market. This chapter explains the regulatory framework that is expected to affect the entire market. It illuminates the political scenario of the market and anticipates its impact on the market for Data Encryption Service .

The Data Encryption Service Market research presents a study by combining primary as well as secondary research. The report gives insights on the key factors concerned with generating and limiting Data Encryption Service market growth. Additionally, the report also studies competitive developments, such as mergers and acquisitions, new partnerships, new contracts, and new product developments in the global Data Encryption Service market. The past trends and future prospects included in this report makes it highly comprehensible for the analysis of the market. Moreover, The latest trends, product portfolio, demographics, geographical segmentation, and regulatory framework of the Data Encryption Service market have also been included in the study.

Ask For Discount (Special Offer: Get 25% discount on this report) @ https://www.marketresearchintellect.com/ask-for-discount/?rid=192073&utm_source=SI&utm_medium=888

Table of Content

1 Introduction of Data Encryption Service Market1.1 Overview of the Market1.2 Scope of Report1.3 Assumptions

2 Executive Summary

3 Research Methodology3.1 Data Mining3.2 Validation3.3 Primary Interviews3.4 List of Data Sources

4 Data Encryption Service Market Outlook4.1 Overview4.2 Market Dynamics4.2.1 Drivers4.2.2 Restraints4.2.3 Opportunities4.3 Porters Five Force Model4.4 Value Chain Analysis

5 Data Encryption Service Market, By Deployment Model5.1 Overview

6 Data Encryption Service Market, By Solution6.1 Overview

7 Data Encryption Service Market, By Vertical7.1 Overview

8 Data Encryption Service Market, By Geography8.1 Overview8.2 North America8.2.1 U.S.8.2.2 Canada8.2.3 Mexico8.3 Europe8.3.1 Germany8.3.2 U.K.8.3.3 France8.3.4 Rest of Europe8.4 Asia Pacific8.4.1 China8.4.2 Japan8.4.3 India8.4.4 Rest of Asia Pacific8.5 Rest of the World8.5.1 Latin America8.5.2 Middle East

9 Data Encryption Service Market Competitive Landscape9.1 Overview9.2 Company Market Ranking9.3 Key Development Strategies

10 Company Profiles10.1.1 Overview10.1.2 Financial Performance10.1.3 Product Outlook10.1.4 Key Developments

11 Appendix11.1 Related Research

Complete Report is Available @ https://www.marketresearchintellect.com/product/global-data-encryption-service-market-size-and-forecast/?utm_source=SI&utm_medium=888

We also offer customization on reports based on specific client requirement:

1-Freecountry level analysis forany 5 countriesof your choice.

2-FreeCompetitive analysis of any market players.

3-Free 40 analyst hoursto cover any other data points

About Us:

Market Research Intellect provides syndicated and customized research reports to clients from various industries and organizations with the aim of delivering functional expertise. We provide reports for all industries including Energy, Technology, Manufacturing and Construction, Chemicals and Materials, Food and Beverage and more. These reports deliver an in-depth study of the market with industry analysis, market value for regions and countries and trends that are pertinent to the industry.

Contact Us:

Mr. Steven FernandesMarket Research IntellectNew Jersey ( USA )Tel: +1-650-781-4080

Email: [emailprotected]

Get Our Trending Report

https://www.marketresearchblogs.com/

https://www.marktforschungsblogs.com/

Tags: Data Encryption Service Market Size, Data Encryption Service Market Growth, Data Encryption Service Market Forecast, Data Encryption Service Market Analysis, Data Encryption Service Market Trends, Data Encryption Service Market

See original here:
Data Encryption Service Market Size Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026 - Science In Me

Zoom Cryptography and Authentication Problems – CircleID

In my last blog post about Zoom, I noted that the company says "that critics have misunderstood how they do encryption." New research from Citizen Lab show that not only were the critics correct, Zoom's design shows that they're completely ignorant about encryption. When companies roll their own crypto, I expect it to have flaws. I don't expect those flaws to be errors I'd find unacceptable in an introductory undergraduate class, but that's what happened here.

Let's start with the egregious flaw. In this particular context, it's probably not a real threat I doubt if anyone but a major SIGINT agency could exploit it but it's just one of these things that you should absolutely never do: use the Electronic Code Book (ECB) mode of encryption for messages. Here's what I've told my students about ECB:

Again, it would be hard to exploit here, but it suggests that the encryption code was written by someone who knew nothing whatsoever about the subject and lays open the suspicion that there are deeper, more subtle problems. I mean, subtle problems are hard to avoid in cryptography even when you know what you're doing.

The more important error isn't that egregious, but it does show a fundamental misunderstanding of what "end-to-end encryption" means. The definition from a recent Internet Society brief is a good one:

End-to-end (E2E) encryption is any form of encryption in which only the sender and intended recipient hold the keys to decrypt the message. The most important aspect of E2E encryption is that no third party, even the party providing the communication service, has knowledge of the encryption keys.

As shown by Citizen Lab, Zoom's code does not meet that definition:

By default, all participants' audio and video in a Zoom meeting appear to be encrypted and decrypted with a single AES-128 key shared amongst the participants. The AES key appears to be generated and distributed to the meeting's participants by Zoom servers.

Zoom has the key, and could, in principle, retain it and use it to decrypt conversations. They say they do not do so, which is good, but this clearly does not meet the definition [emphasis added]: no third party, even the party providing the communication service, has knowledge of the encryption keys."

Doing key management that is, ensuring that the proper parties and only the proper parties know the key is a hard problem, especially in a multiparty conversation. At a minimum, you need assurance that someone you're talking to is indeed the proper party, and not some interloper or eavesdropper. That, in turn, requires that anyone who is concerned about the security of the conversation has to have some reason to believe in the other parties' identities, whether via direct authentication or because some trusted party has vouched for them. On today's Internet, when consumers log on to a remote site, they typically supply a password or the like to authenticate themselves, but the site's own identity is established via a trusted third party known as a certificate authority.

Zoom can't quite do identification correctly. You can have a login with Zoom, and meeting hosts generally do, but often, participants do not. Again, this is less of an issue in an enterprise setting, where most users could be registered, but that won't always be true for, say, university or school classes. Without participant identification and authentication, it isn't possible for Zoom to set up a strongly protected session, no matter how good their cryptography; you could end up talking to Boris or Natasha when you really wanted to talk confidentially to moose or squirrel.

You can associate a password or PIN with a meeting invitation, but Zoom knows this value and uses it for access control, meaning that it's not a good enough secret to use to set up a secure, private conference.

Suppose, though, that all participants are strongly authenticated and have some cryptographic credentials they can use to authenticate themselves. Can Zoom software then set up true end-to-end encryption? Yes, it can, but it requires sophisticated cryptographic mechanisms. Zoom manifestly does not have the right expertise to set up something like that, or they wouldn't use ECB mode or misunderstand what end-to-end encryption really is.

Suppose that Zoom wants to do everything right. Could they retrofit true end-to-end encryption, done properly? The sticking point is likely to be authenticating users. Zoom likes to outsource authentication to its enterprise clients, which is great for their intended market but says nothing about the existence of cryptographic credentials.

All that said, it might be possible to use a so-called Password-authenticated key exchange (PAKE) protocol to let participants themselves agree on a secure, shared key. (Disclaimer: many years ago, a colleague and I co-invented EKE, the first such scheme.) But multiparty PAKEs are rather rare. I don't know if there are any that are secure enough and would scale to enough users.

So: Zoom is doing its cryptography very badly, and while some of the errors can be fixed pretty easily, others are difficult and will take time and expertise to solve.

Visit link:
Zoom Cryptography and Authentication Problems - CircleID

Cyber Work podcast: Cryptography careers and IoT vulnerabilities with Ted Shorter – Security Boulevard

Introduction

In this episode of Infosecs Cyber Work podcast series, host Chris Sienko speaks with Ted Shorter. Ted is co-founder and CTO of Keyfactor, a computer security firm. He has worked in security for over 20 years, with a focus on cryptography, application security, authentication and authorization services, and software vulnerability analysis. His past experience includes a masters degree in computer science from Johns Hopkins University, active CISSP certification and 10 years at the National Security Agency (NSA).

As a computer scientist and team lead at NSA, Ted briefed high-level government officials, including presidential advisors and members of the Joint Chiefs of Staff. Ted also served as lead software developer on a contract with the Department of Defense to integrate biometric authentication with the DoD Common Access Card program. Ted lives in Akron, Ohio with his wife and two sons.

Ted and Chris talked about a recent Keyfactor report, the danger of so-called predictable randomness, the raw work of cryptography in keeping devices like these safe, the importance of building security into their devices during design and development and some career advice for those who might like a career in cryptography.

A big piece of Teds foundational experiences center around problem-solving, and it is one of those things you are sort of born with. In terms of his professional history, it really started to take off when he joined a consulting firm called Certified Security Solutions in 2003. It was a boutique consultancy that spent a lot of time talking to clients about security strategy.

During this time, Ted worked a lot with digital certificates and public infrastructure. Certified Security Solutions focused on identifying unmet needs of customers regarding products and implementation. To this end, they (Read more...)

Originally posted here:
Cyber Work podcast: Cryptography careers and IoT vulnerabilities with Ted Shorter - Security Boulevard

Fraud prevention startup working on anonymous peer-to-peer verification network – TechRepublic

Identiq uses cryptographic algorithms and preserves customer privacy while enabling companies to to identify new customers through a network of trust.

An ID validation and fraud prevention startup has developed what it claims is the first and only truly anonymous peer-to-peer verification network that enables companies to work together to validate identities without sharing or exposing any personal customer data. Identiq uses cryptographic algorithms to anonymously compare new user data against identities already trusted by other network members while preserving customer privacy, the company said. It was named a Gartner "Cool Vendor" for privacy.

Neither blockchain or artificial intelligence are usedonly cryptography, said Uri Arad, co-founder and vice president of product. So far, he said, over 20 companies in retail, ridesharing, travel, gaming, and social networking have expressed interest in joining the network when it launches this quarter.

Member B2C companies "can validate their users by working together as a network to ask questions about people and data points they don't know'' and vouch for them as trustworthy users, explained Identiq Chief Marketing Officer Shmuli Goldberg.

He added that no data is ever shared among network members or with Identiq. "This is in direct contrast with how this industry has been running" for over 20 years, Goldberg said, noting that Equifax and other credit bureaus collect and allow a company to validate a consumer's data against what they have in their databases.

"We are posing the exact opposite [model] and we believe, and our tech has shown, we can create a better user experience trying to validate user identities without sharing any data whatsoever," he said.

SEE:Windows 10 security: A guide for business leaders(TechRepublic Premium)

The technology can sniff out fraudsters and verify identity without relying on the usual methods of checking against third-party data providers, Goldberg said. It does it without sharing or storing any information at all, thus eliminating ID theft and personal information sprawl, he said.

After spending several years at PayPal managing risk analysts and data scientists, Arad said, he came to the realization that even very large companies "struggle to manage risk when it comes to new customers or any information they have not seen before," and that "this is what fraudsters are taking advantage of.''

If new information is coming in when a person opens an account online, he said. "there's nothing for you to say this looks suspicious. The only way companies are able to make any progress in this area is by going to external data vendors and asking them what they think,'' he said.

The idea is to make it easy for companies to identify who their new customers are through a "network of trust," he said. They can do that without sharing the customer's personal information, he said.

"We looked into a branch of cryptography called multi-party computation, which is over 30 to 40 years old," Arad said. "This branch deals with the question of how multiple parties can calculate some function together without revealing their own individual inputs."

For example, if you were conducting an online auction, every participant can make a bid and multi-party computation can allow the participants to find out who the winner is without revealing individual bids, he said.

Another example would be in a ride sharing scenario--it's very important to validate the identity of both the driver and the riders for the safety of both, said Goldberg.

"Instead of building a large database to solve identity, we are the first company that says we don't want your datawe see no data, we buy/sell/share no data," he stressed. "That's the inverse of the model of the vast majority of solutions on the market today."

Multi-party computation allows parties to make sure they both have the same phone number or more sensitive information like credit card data "without me having to tell you what I have and vice versa,'' Goldberg said.

Since it is a provider-less technology company, Identiq's revenue model will be to take a small portion of what people pay to use the network, he said.

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

See the original post here:
Fraud prevention startup working on anonymous peer-to-peer verification network - TechRepublic

Coronavirus Pandemic Reminds Us That Security Is Important During the Zoom Boom – Cointelegraph

Even with all the looming uncertainty surrounding the global COVID-19 pandemic, system security needs to remain at the forefront of companies planning.

Businesses around the world are shutting down under local, state or national decrees as COVID-19 fears bring caution regarding public gatherings. Unsurprisingly, hackers have used the unprecedented opportunity of chaos and panic to probe weaknesses in information technology systems. One of those systems happened to be the United States Department of Health and Human Services, making the act even more egregious, considering the circumstances.

But the problem extends beyond hackers and threats to companies and individuals. During times of crisis, civil liberties also come under threat, and cryptography often provides a shield against unwarranted encroaches by the government.

So, whether youre a business worried about paying server and security costs during this economic turmoil or an individual protecting your digital assets, cryptography can serve you well.

Its an unfortunate byproduct of crises, but hackers can wield social, economic and financial chaos for their gain.

For example, hackers launched a distributed denial of service attack against the Department of Health and Human Services last month in a bid to slow down the COVID-19 response. The current narrative makes the hack seem distinctly malicious in its effort to make the pandemic response slower, but there is likely more to the story.

The surging number of cases and by extension the hoarding of medical data under a consolidated government system presents an opportunity for hackers to abscond with sensitive information. Moreover, when emergency responses elicit rapid reactions, much of the systems security may be a patchwork of protocols not backend tested thoroughly.

For example, cases being uploaded from the field such as hospitals, makeshift testing centers, etc. to government servers that aggregate and display current COVID-19 metrics may contain serious security flaws due to the rapidity of their development. Applications developed by small teams to assist doctors in times of crisis may also not follow security standards, specifically the Health Insurance Portability and Accountability Act commonly referred to as HIPAA compliance laws, which are esoteric and outside the scope of most technology-focused engineers.

Hackers, looking for medical data that can be sold at a high value on black markets, likely view this as a gold mine. The hacking incident against the Health Department is probably not the first, nor will it be the last, of ongoing attempts to infiltrate prominent security systems.

Cryptography provides a useful layer of defense against such intrusions. Masking medical data identifiers and other sensitive information is possible with a variety of cryptographic standards available today. Many projects in the crypto sector explicitly focus on financial applications, but the cryptographic modules for protecting and verifying sensitive data translate to other industries, such as healthcare, very well.

Thats not to say that cryptography is a panacea to the ongoing fallout of COVID-19. In some cases, governments are covertly using the dilemma as a method to subvert encryption entirely, such as is occurring in the U.S.

Hidden behind all of the headlines about the Federal Reserve interest rate, the S&P 500 tanking and COVID-19 cases was a proposed legislation effort that has profound consequences on the field of cryptography.

Known as the EARN IT bill, U.S. Congresspeople have proposed a bill that would effectively grant the U.S. government the ability to access any digital message. The bill would create a consortium of law enforcement agencies headed by the Justice Department that would institute a standard verification mechanism for any digital message. If the message does not use the standard verification of the governments technology to authenticate the message, then the sending/receiving parties can be sued into oblivion.

Concerning cryptography, this is a disastrous bill. The proposed document cleverly avoids the explicit use of the word encryption, but its language indicates that cryptography would become illegal, as all messages cannot be private between two counterparties. The government gets a backdoor.

Encryption would become illegal by default because it preserves privacy and authentication of a message between two parties, preventing the ability of a third party to snoop on the messages contents.

The bill is still in its early stages, but it shows, once again, that governments do not approve of widespread encryption use among the public. Whether it be the Clipper chip scandal of the 1990s or the subversive move by Congress that is masked by a national crisis, the governments efforts are persistent.

Fortunately, cryptography which is empirically just math does not adhere to the caprices of hackers, governments or opportunities to subvert its influence. The grassroots encryption movement started by cypherpunks and bolstered by the crypto community has spread the technology to an extent that is unlikely to fade away at fiat decree.

For businesses enduring the turbulent COVID-19 situation, dont forget to account for your security during these vulnerable times. As individuals, remember that cryptography is your friend in protecting your civil liberties during a public health crisis.

The views, thoughts and opinions expressed here are the authors alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.

Dr. Huang Lin is the co-founder and CTO of Suterusu, a project developing trustless privacy technology. He holds Ph.D. degrees in applied cryptography and privacy-preserving distributed systems from Shanghai Jiao Tong University and the University of Florida. He has worked as a postdoctoral researcher at Ecole Polytechnique Federale de Lausanne on applied cryptography for genomic privacy and blockchain-based data monetization.

Read the original:
Coronavirus Pandemic Reminds Us That Security Is Important During the Zoom Boom - Cointelegraph