Organizations are creating the perfect storm by not implementing security basics – Help Net Security

European organizations have a false sense of security when it comes to protecting themselves, with only 68% seeing themselves as vulnerable, down from 86% in 2018, according to Thales.

This confidence flies in the face of the findings of the survey of 509 European executives which reveals 52% of organizations were breached or failed a compliance audit in 2019, raising concerns as to why 20% intend to reduce data security spend in the next year.

The findings come as workers across Europe are working from home due to COVID-19, often using personal devices which dont have the built-in security office systems do, significantly increasing risk to sensitive data.

Across the board, companies are racing to digitally transform and move more applications and data to the cloud; 37% of European countries stated they are aggressively disrupting the markets they participate in or embedding digital capabilities to enable greater enterprise agility.

A key aspect of this transformation is in the cloud becoming the leading data environment. 46% of all data stored by European organizations is now stored in the cloud, and with 43% of that data in the cloud being described as sensitive, it is essential that it is kept safe.

As more sensitive data is stored in cloud environments, however, data security risks increase. This is of particular concern given that 100% of businesses surveyed report that at least some of the sensitive data they are storing in the cloud is not encrypted.

Only 54% of sensitive data in the cloud is protected by encryption and even less (44%) is protected by tokenisation, highlighting the disconnect between the level of investment companies are making into cybersecurity and the increasing threats they face.

Despite the multitude of threats, businesses feel that the complexity (40%) of their environments is holding their data security capabilities back.

Multi-cloud adoption is the main driver of this complexity; 80% of businesses are using more than one IaaS (Infrastructure as a Service) vendor, whilst 29% have more than 50 SaaS (Software as a Service) applications to manage.

Businesses also identified a lack of budget (30%), staff to manage (28%) and organization buy-in/low priority (25%) as other top blockers.

Businesses are continuing to race towards digital transformation and many are increasingly reliant on complex cloud environments, without taking a zero-trust approach. Data is more at risk than ever, whilst organizations are unwittingly creating the perfect storm for hackers by not implementing the security basics, commented Rob Elliss, EMEA Vice President for Data Security solutions at Thales.

Unfortunately, this will result in increasing problems, particularly in a world where working remotely will be part of the new-normal, unless companies can step up to the plate when it comes to keeping data safe.

Whilst organizations continue to look at the threat of today, many are starting to turn their attention to peril that the acceleration of computing power, quantum, could bring to them. In fact, 93% respondents are concerned quantum computing will lead to exploits being created that could expose the sensitive data they hold.

Whats more, 69% European organizations expect quantum to affect their cryptographic operations in the next five years.

As a result, most organizations are reacting, with 31% planning to offset quantum computing threats by switching away from static encryption or symmetric cryptography. Furthermore, a similar amount (30%) plans to implement key management that supports quantum safe random number generator.

It is clear that businesses are aware of evolving threats they face and its reassuring to see them acknowledging some of the key steps they need to take including moving away from static encryption and implementing quantum-proof key management.

Its critical, though, that organizations dont just look at threats years away, but invest in their cybersecurity processes now and see it as an integral part of their digital transformation, Elliss concluded.

Continue reading here:
Organizations are creating the perfect storm by not implementing security basics - Help Net Security

Global Quantum Cryptography Services Market 2020 | Know the Companies List Could Potentially Benefit or Loose out From the Impact of COVID-19 | Top…

A perfect mix of quantitative & qualitative Quantum Cryptography Servicesmarket information highlighting developments, industry challenges that competitors are facing along with gaps and opportunities available and would trend in Quantum Cryptography Servicesmarket. The study bridges the historical data from 2014 to 2019 and estimated until 2025.

The Quantum Cryptography ServicesMarket report also provides the market impact and new opportunities created due to the COVID19/CORONA Virus Catastrophe The total market is further divided by company, by country, and by application/types for the competitive landscape analysis. The report then estimates 2020-2025 market development trends of Quantum Cryptography ServicesIndustry.

Downlaod Sample ToC to understand the CORONA Virus/COVID19 impact and be smart in redefining business strategies. https://inforgrowth.com/CovidImpact-Request/6358861/quantum-cryptography-services-market

The Top players are MagiQ Technologies, Quantum XC, Qubitekk, QuintessenceLabs, NuCrypt, Qasky, Crypta La.

Market Segmentation:

Quantum Cryptography Services Market is analyzed by types like Consulting and Advisory, Deployment and Integration, Support and Maintenan

On the basis of the end users/applications, G&P, Defense, BFSI, Telec

Download Free Sample PDF along with few company profileshttps://inforgrowth.com/sample-request/6358861/quantum-cryptography-services-market

Be the first to knock the door showing the potential that Quantum Cryptography Servicesmarket is holding in it. Uncover the Gaps and Opportunities to derive the most relevant insights from our research document to gain market size.

A major chunk of this Global Quantum Cryptography ServicesMarket research report is talking about some significant approaches for enhancing the performance of the companies. Marketing strategies and different channels have been listed here. Collectively, it gives more focus on changing rules, regulations, and policies of governments. It will help to both established and new startups of the market.

The study objectives of this report are:To analyze global Quantum Cryptography Servicesstatus, future forecast, growth opportunity, key market, and key players.To present the Quantum Cryptography Servicesdevelopment in the United States, Europe, and China.To strategically profile the key players and comprehensively analyze their development plan and strategies.To define, describe and forecast the market by product type, market, and key regions.

Get Special Discount Up To 50%, https://inforgrowth.com/discount/6358861/quantum-cryptography-services-market

Major Points from Table of Contents

1 Quantum Cryptography Services Quantum Cryptography Services Market Overview2 Quantum Cryptography Services Market Competition by Manufacturers3 Production Capacity by Region4 Global Quantum Cryptography Services Market by Regions5 Production, Revenue, Price Trend by Type6 Global Quantum Cryptography Services Market Analysis by Application7 Company Profiles and Key Figures in Quantum Cryptography Services Business8 Quantum Cryptography Services Manufacturing Cost Analysis9 Marketing Channel, Distributors and Customers10 Market Dynamics11 Production and Supply Forecast12 Consumption and Demand Forecast13 Forecast by Type and by Application (2021-2026)14 Research Finding and Conclusion15 Methodology and Data Source.

ENQUIRE MORE ABOUT THIS REPORT AT https://inforgrowth.com/enquiry/6358861/quantum-cryptography-services-market

FOR ALL YOUR RESEARCH NEEDS, REACH OUT TO US AT:Address: 6400 Village Pkwy suite # 104, Dublin, CA 94568, USAContact Name: Rohan S.Email:[emailprotected]Phone: +1-909-329-2808UK: +44 (203) 743 1898Website: http://www.inforgrowth.com

Follow this link:
Global Quantum Cryptography Services Market 2020 | Know the Companies List Could Potentially Benefit or Loose out From the Impact of COVID-19 | Top...

Quantum computing is the next big leap – Lexology

Traditional network infrastructures and cybersecurity standards will be compromised if quantum computing becomes viable, the reason why quantum R&D is a key factor of EUs digital strategy

Our most sensitive information, say banking or browsing data, is kept secure by rather resilient encryption methods. With current computing capabilities, it is a very difficult task for a computer to run the necessary math in order to extract information from encrypted data. That is not the case, however, with quantum computing.

At their smallest, computers are made up of transistors, which process the smallest form of data: bits or 0s and 1s. Contrary to regular machines, which operate in bits, quantum computers process qubits, which carry not one of those two values, but any of those two. Because they operate in qubits, they are able to process data unseemingly faster.

If a regular computer were to guess the combination of two bits, it would take, at worst, four different tries (22 00, 01, 10, 11) before guessing it. A quantum computer would only require the square root of that, because each qubit carries any of the two values. When processing large numbers this makes a huge difference.

While it is not expected that quantum computers will be commercially viable or even sufficiently developed anytime soon to squander computing as it is today, a number of the encryption algorithms used today are not quantum-resistant.

Having considered the above, it is not uncalled for that organizations are rethinking their cybersecurity standards in order to protect their data in view of new developing technologies, namely quantum computing.

Portugal signed up for EU's Quantum Communication Infrastructure initiative ("EuroQCI"). The initiative trusts on developing a network over the next ten years for sensitive information to be shared. As with anything that may be ill-used, quantum computing poses a serious cyberthreat. EuroQCI will use quantum technologies to ensure the secure transfer and storage of sensitive information. As computer parts are now as small as the size of an atom and current computing is reaching its physical limits, the EuroQCI aims at making quantum computing and cryptography a part of conventional communication networks, which is in line with Portugal's strategy to strengthen the country's digital ecosystem.

Objective number one of Portugal's National Cybersecurity Strategy is to ensure national digital resilience by leveraging inclusion and cooperation in order to bolster the security of cyberspace in view of threats which may jeopardize or cause disruption of networks and information systems essential to society. Currently, the EU's Study on the System Architecture of a Quantum Communication Infrastructure (within the EuroQCI initiative) is open for contributions on the future of quantum network infrastructures. The consultation is open until 10 June 2020.

Go here to read the rest:
Quantum computing is the next big leap - Lexology

UC San Diego’s CREATE and SDSC Awarded National K-12 STEM Grant – UC San Diego Health

Image credit: UC San Diego CREATE

The U.S. Department of Defenses (DoD) Defense STEM Education Consortium (DESC) has awarded a one-year grant to the San Diego Supercomputer Center (SDSC) at UC San Diego and the UC San Diego Mathematics Project housed at the universitys Center for Research on Educational Equity, Assessment, and Teaching Excellence (CREATE), to introduce computing into high school math classrooms.

The DSEC Innovation Bloc grant, called ICAT through DM - short for Introducing Computing and Technology Through Discrete Math problem-solving - will fund a Summer Institute for regional high school mathematics teachers and a Summer Academy for military-connected, underserved, and underrepresented rising seniors.

Robert Sinkovits, director of SDSCs scientific computing applications and lead for SDSCs Education and Training program; and Osvaldo Soto, director of the UC San Diego Mathematics Project at CREATE, are the Principal Investigators for the grant.

The DSEC Innovation Bloc grant was awarded as part of a five-year, $75 million award by the DoD under which DSEC focuses on K-16 (kindergarten through college) STEM enrichment programs for military-connected and/or low-income students and educators, as well as workforce engagement, program evaluation, and public outreach efforts across the nation. The consortium is comprised of 18 organizations, includes UC San Diego CREATE, which serves as a program hub lead on the DSEC grant.

UC San Diego CREATE is helping our campus to leverage its contacts and networks to support STEM learning for all students, particularly those from less advantaged backgrounds, to make use of learning opportunities funded by the DoD and its many STEM partners, said Susan Yonezawa, associate director of CREATE and a co-director of the UC San Diego Math Project. Were pleased the DSEC Innovation Bloc grant, a collaboration between the UC San Diego Mathematics Project and SDSC, will bring crucial computer and mathematics skills and knowledge to military-connected, underserved, and underrepresented students in San Diego.

The ICAT through DMs Summer Institute professional development program for teachers and Summer Academy for students were slated to be held at SDSC, but because of COVID-19 restrictions the programs have been moved online. The online Summer Institute will be held June 22-July 2, 2020, for 20 teachers from the Oceanside Unified School District, San Diego Unified School District, San Marcos Unified School District and Sweetwater Union High School District. Teachers will explore Discrete Math content and be introduced to Python computer language through games of strategy, cryptography and counting techniques. The curriculum will focus on identifying the best conditions for using computing and technology to solve math problems (an example of Standard for Mathematical Practice #5: Use appropriate tools strategically).

The online Summer Academy, led by the Institute teachers, will be held the following week, July 6-10, 2020, for 24 military-connected, underserved, and underrepresented rising seniors from the teachers high schools.

Computational and mathematical thinking are essential to the DoD workforce in nearly every domain, from climate simulations and aerodynamics to analyzing large volumes of text data and satellite imagery, said Sinkovits. Discrete mathematics is particularly important in areas as diverse as cryptography, logistics, communications networks and complex decision making.

Mathematics is traditionally taught using a pencil-and-paper approach and often lacks a real-world context, frequently leading to a sense of alienation among middle and high school students along with missed opportunities to advance critical mathematical and computational ways of thinking, noted Sinkovits.

Many of todays real-world problems require mathematical solutions that can only be solved using computational techniques and resources and a strong understanding of key mathematical concepts backed with the power of technology to help students as well as teachers better connect empirical and deductive reasoning, Soto said.

SDSCs involvement with UC San Diego CREATE began when Sinkovits and SDSC Education Manager Ange Mason met Yonezawa to discuss ideas for SDSCs summer program for teachers.

One could say that Susan was our matchmaker, said Sinkovits. She suggested that we meet with Osvaldo from the UC San Diego Math Project, as well as Trang Vu, a veteran math teacher and one of the developers of the Discrete Math Pre-Collegiate Curriculum. Together, the ideas started flowing quickly for a proposal to DSEC to fund a discrete mathematics program for teachers and their students. Were excited to be involved in this very worthwhile initiative.

As the project got underway, we were fortunate enough to recruit more outstanding teachers to help prepare for our summer activities: Tony Claudio, a computer science teacher from Sweetwater Union High School District, and Jorge Hernandez Leon, a math teacher from San Diego Unified School District, said Soto.

Originally posted here:
UC San Diego's CREATE and SDSC Awarded National K-12 STEM Grant - UC San Diego Health

Hardware Encryption Market to Witness Increase in Revenues by 2025 – Cole of Duty

Global Hardware Encryption Market: Snapshot

A variety of factors or specific business needs influences the choice of specific encryption solutions among various end-use industries. Hardware encryption is gaining popularity for protecting sensitive data on portable devices such as laptops and USB flash drives. Its ease of use, consistent performance, and robust protection against numerous common and less sophisticated attacks offsets its high cost compared to software-based encryption. For instance, any brute-force attacks by hackers to gain access to hardware encrypted chips can be easily thwarted with the help of this. The mechanism of hardware encryption works on the devices on-board security, which performs the needed encryption and decryption. Unlike software-based encryption, it doesnt require drivers and has minimal configuration requirements.

Download Brochure of This Market Report at https://www.tmrresearch.com/sample/sample?flag=B&rep_id=647

However, since it is tied to a particular device, hardware encryption methods may not prove so helpful. Nevertheless, the soaring use of mobile devices by several governmental agencies and the storage of confidential financial and healthcare data in mobile devices have propelled the demand for hardware encryption methods. In case the devices are stolen, the data cannot be compromised.

In recent years, Advanced Encryption Standard (AES), a specification standard by the National Institute of Standards and Technology (NIST) has been gaining prominence for data security for hardware as well as software encryption method. The cryptographic module is fast gaining adoption among several military, government, healthcare institutions, and financial organizations world over, especially in developing and developed nations. AES has become one of the most popular algorithms adopted in symmetric key cryptography by various governmental agencies in the U.S. Boasting of marked improvements over its predecessors, AES employs longer cryptographic keys, offers easy implementation, and can be used in restricted environments such as in smart cards.

Global Hardware Encryption Market: Overview

The global market for hardware encryption is projected to witness healthy growth throughout the forecast period, thanks to the advent of portable storage devices in order to transfer files and information between computers. In addition, these devices help in improving the security concerns and confidentiality of data. These devices cannot be altered or removed by any malware or virus or be uninstalled by the user, owing to which the market is likely to witness high growth over the coming few years.

The research report on the global hardware encryption market offers a thorough overview, focusing on the key growth drivers and currents trends in the market. The research study throws light on the product segmentation, applications, technological advancements, and the regional segments of the global hardware encryption market. In addition, the limitations and challenges that are being faced by the prominent players in the overall market have been discussed in the research study.

Global Hardware Encryption Market: Drivers and Restraints

The rising concerns related to the privacy of data and data security and tremendous expansion of the digital content are anticipated to encourage the growth of the global hardware encryption market throughout the forecast period. In addition, several advantages offered by hardware encryption in comparison with software encryption technology and the rising need of regulatory framework are some of the other factors estimated to accelerate the growth of the overall market in the near future.

On the contrary, the need for high capital investment and the lack of awareness among consumers reading the benefits of hardware encryption technology are projected to restrict the growth of the global hardware encryption market in the next few years. Nevertheless, the emergence of economical and compact hardware encryption technique and the rising adoption of cloud computing are expected to offer promising opportunities for market players in the coming years.

Global Hardware Encryption Market: Region-wise Outlook

The global market for hardware encryption has been divided on the basis of geography into Europe, the Middle East and Africa, North America, Latin America, and Asia Pacific. The research study has provided a detailed analysis of the leading regional segment, highlighting the market share and anticipated growth rate. In addition, the key factors that are encouraging the growth of these segments have been discussed in the scope of the research study.

According to the research study, Asia Pacific is anticipated to witness strong growth throughout the forecast period, owing to the robust development of the IT industry. In addition, a substantial contribution from China, India, Malaysia, and South Korea is expected to accelerate the growth of the hardware encryption market in Asia Pacific throughout the forecast period. Furthermore, with the presence of a large number of established hardware encryption manufacturing companies, North America is anticipated to witness healthy growth in the next few years.

Key Players Mentioned in the Research Report are:

The global hardware encryption market is projected to witness a high level of competition in the coming few years. The leading players in the market are focusing on offering new products to consumers in order to enhance their market penetration and maintain their dominant position throughout the forecast period. Some of the prominent players operating in the hardware encryption market across the market are Netapp, Maxim Integrated Products, Inc., Toshiba Corp., Gemalto NV., Micron Technology, Inc., Samsung Electronics Co. Ltd., Kanguru Solutions, Thales (E-Security), Winmagic Inc., Kingston Technology Corp., Western Digital Corp., and Seagate Technology PLC.

Furthermore, the research study has provided a detailed analysis of the competitive landscape of the global hardware encryption market. An in-depth overview of company profiles and their financial overview have been discussed at length in the scope of the research study. Additionally, the business strategies, SWOT analysis, and the recent developments have been included to offer a clear understanding of the overall market.

Request For TOC On this Market Report at https://www.tmrresearch.com/sample/sample?flag=T&rep_id=647

About TMR Research:

TMR Research is a premier provider of customized market research and consulting services to business entities keen on succeeding in todays supercharged economic climate. Armed with an experienced, dedicated, and dynamic team of analysts, we are redefining the way our clients conduct business by providing them with authoritative and trusted research studies in tune with the latest methodologies and market trends.

More:
Hardware Encryption Market to Witness Increase in Revenues by 2025 - Cole of Duty

Global Blockchain Market 2020: Trends, Market Share, Industry Size, Growth, Opportunities Analysis and Forecast to 2023 – Personal Injury Bureau UK

A blockchain, originally block chain, is a growing list of records, called blocks, which are linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a merkle tree root hash).

According to this study, over the next five years the Blockchain market will register a xx% CAGR in terms of revenue, the global market size will reach US$ xx million by 2023, from US$ xx million in 2017. In particular, this report presents the global revenue market share of key companies in Blockchain business, shared in Chapter 3.

This report presents a comprehensive overview, market shares and growth opportunities of Blockchain market by product type, application, key companies and key regions.

This study considers the Blockchain value generated from the sales of the following segments:

Segmentation by product type: breakdown data from 2013 to 2018, in Section 2.3; and forecast to 2023 in section 10.7.

On-premise

Software

Segmentation by application: breakdown data from 2013 to 2018, in Section 2.4; and forecast to 2023 in section 10.8.

SMEs

Large Enterprises

This report also splits the market by region: Breakdown data in Chapter 4, 5, 6, 7 and 8.

Americas

United States

Canada

Mexico

Brazil

APAC

China

Japan

Korea

Southeast Asia

India

Australia

Europe

Germany

France

UK

Italy

Russia

Spain

Middle East & Africa

Egypt

South Africa

Israel

Turkey

GCC Countries

The report also presents the market competition landscape and a corresponding detailed analysis of the major vendor/manufacturers in the market. The key manufacturers covered in this report: Breakdown data in in Chapter 3.

IBM (US)

AWS (US)

Microsoft (US)

SAP (Germany)

Intel (US)

Oracle (US)

Bitfury (US)

Cegeka (Netherlands)

Earthport (UK)

Guardtime (Estonia)

Digital Asset Holdings (US)

Chain (US)

Huawei (China)

BlockCypher (US)

Symbiont (US)

BigchainDB ( Germany)

Applied Blockchain (UK?

RecordsKeeper (Gibraltar)

Blockpoint (US)

Auxesis Group (India)

BTL Group (Canada)

Blockchain Foundry (Singapore)

In addition, this report discusses the key drivers influencing market growth, opportunities, the challenges and the risks faced by key players and the market as a whole. It also analyzes key emerging trends and their impact on present and future development.

Research objectives

To study and analyze the global Blockchain market size by key regions/countries, product type and application, history data from 2013 to 2017, and forecast to 2023.

To understand the structure of Blockchain market by identifying its various subsegments.

Focuses on the key global Blockchain players, to define, describe and analyze the value, market share, market competition landscape, SWOT analysis and development plans in next few years.

To analyze the Blockchain with respect to individual growth trends, future prospects, and their contribution to the total market.

To share detailed information about the key factors influencing the growth of the market (growth potential, opportunities, drivers, industry-specific challenges and risks).

To project the size of Blockchain submarkets, with respect to key regions (along with their respective key countries).

To analyze competitive developments such as expansions, agreements, new product launches and acquisitions in the market.

To strategically profile the key players and comprehensively analyze their growth strategies.

Table of Contents

2018-2023 Global Blockchain Market Report (Status and Outlook)

1 Scope of the Report

1.1 Market Introduction

1.2 Research Objectives

1.3 Years Considered

1.4 Market Research Methodology

1.5 Economic Indicators

1.6 Currency Considered

2 Executive Summary

2.1 World Market Overview

2.1.1 Global Blockchain Market Size 2013-2023

2.1.2 Blockchain Market Size CAGR by Region

2.2 Blockchain Segment by Type

2.2.1 On-premise

2.2.2 Software

2.3 Blockchain Market Size by Type

2.3.1 Global Blockchain Market Size Market Share by Type (2013-2018)

2.3.2 Global Blockchain Market Size Growth Rate by Type (2013-2018)

2.4 Blockchain Segment by Application

2.4.1 SMEs

2.4.2 Large Enterprises

2.5 Blockchain Market Size by Application

2.5.1 Global Blockchain Market Size Market Share by Application (2013-2018)

2.5.2 Global Blockchain Market Size Growth Rate by Application (2013-2018)

3 Global Blockchain by Players

3.1 Global Blockchain Market Size Market Share by Players

3.1.1 Global Blockchain Market Size by Players (2016-2018)

3.1.2 Global Blockchain Market Size Market Share by Players (2016-2018)

3.2 Global Blockchain Key Players Head office and Products Offered

3.3 Market Concentration Rate Analysis

Go here to read the rest:
Global Blockchain Market 2020: Trends, Market Share, Industry Size, Growth, Opportunities Analysis and Forecast to 2023 - Personal Injury Bureau UK

MegaCryption 6.5.0: Optimized Compression and Authentication – AiThority

MegaCryption, specifically designed for z/OS environments, provides organizations with encryption, decryption, compression, and file management capabilities

Advanced Software Products Group (ASPG, Inc.) is pleased to announce the latest release of MegaCryption 6.5.0. Specifically designed for z/OS environments, MegaCryption is a comprehensive enterprise and mainframe cryptography toolkit providing organizations with encryption, decryption, compression, and file management capabilities.

Enhancements to MegaCryptions compression features have been further developed through a zEDC (zEnterprise Data Compression) feature which can now be utilized by the OpenPGP and Zip/Unzip utilities, providing accelerated compression capabilities on z/OS systems and reducing organization processing times. A newly added Enhanced Compression Mode (ECM) feature also provides users with optimized file compression.

Recommended AI News: Pretected Reveals The Most Popular Cars In America For 2020

An AES-GCM utility has been added, considered one of the most secure ciphers, providing MegaCryption users with an additional form of authenticated encryption and data integrity to their daily security operations.

The addition of IMS cryptography provides IMS users with robust cryptography that will appropriately protect mainframe database services containing classified or sensitive information. MegaCryptions capabilities satisfy both industry and federal data security compliance policies.

Recommended AI News: FourthWall Media Enhances Reveal Platform and Leaps to Cross-Platform Media Analytics

In-keeping with ASPGs proactive approach to regular product developments, general performance enhancements have also been made to the MegaCryption tool providing a seamless end-user experience.

As cybersecurity threats continue to rise, MegaCryption provides an affordable and effective solution for users looking to take a proactive approach to data security. Complementary products within the MegaCryption range are also available for IDMS, DB2, Unix and Linux, and Windows environments. With a wide range of tools, MegaCryption is well suited to satisfy a wide variety of environments.

Recommended AI News: Research Innovations, Inc. Wins Call Order to Deliver Advanced Data Analytics to the Department of Justices MLARS

Share and Enjoy !

Follow this link:
MegaCryption 6.5.0: Optimized Compression and Authentication - AiThority

Watch | What is crypto-jacking? – The Hindu

A cryptocurrency is a digital asset stored on computerised databases. These digital coins are recorded in digital ledgers using strong cryptography to keep them secure.

The ledgers are distributed globally, and each transaction made using cryptocurrencies are codified as blocks. And multiple blocks linking each other forms a blockchain on the distributed ledger.

There are estimated to be more than 47 million cryptocurrency users around the world.

These cryptocurrencies are created through a process called mining. To mine digital coins, miners need to use high-end processors that will consume a lot of electricity.

These minted digital assets are decentralised, unlike physical cash that is regulated by each countrys central bank. The ownership of these digital assets is cryptographically coded, and the blockchain system enables transfer of ownership.

Also read: Notes on a digital currency plan, made in China

But, to ensure it is used only by one entity, the distributed ledger accepts transaction performed by the first user, rejecting all other blocks. This way, the same cryptocurrency cant be used by two different entities, making a fool-proof financial system.

However, there are other ways in which a security breach can happen in this world of cryptocurrency. Crypto-jacking is what some digital coin miners do to illegally gain access to many computers. The miners stealthily drop malware in an unsuspecting users pc.

Once installed, the crypto mining code runs surreptitiously and turns devices into cryptocurrency-mining botnets. The mined digital assets are then stored in digital ledgers with unique codes.

Unlike most other types of malware, crypto-jacking scripts do not use the victims data. But they drain the CPUs resources, which slows down the system, increases electricity usage, and causes irreparable damage to the hardware.

Hackers tend to prefer anonymous cryptocurrencies like Monero and Zcash, over the more popular Bitcoin as it is harder to track illegal activity back to them on these platforms.

The practice of crypto-jacking is currently on the rise as the price of the asset is falling, according to Palo Alto Networks. So, to reduce costs associated with mining, hackers resort to crypto-jacking.

Read more from the original source:
Watch | What is crypto-jacking? - The Hindu

news digest: MemSQL 7.1, Apple releases password resources and the IBM FHE toolkit – SD Times – SDTimes.com

MemSQL 7.1 is now available on MemSQL Helios, the companys elastic cloud database.

This release improves support for OLTP-style (highly-selective) queries on columnstores, high availability, and disaster recovery.

It also delivers improved resilience features to further strengthen MemSQL for mission-critical applications providing transaction processing, operational analytics, and more.

The MemSQL 7.1 release delivers a big advance in our ability to support system-of-record applications on MemSQL, including improvements to SingleStore (unique keys on columnstores, fast selective joins on columnstores); DR failback; easier stored procedure programming for transactional applications; useful new built-in functions to ease application development and migration; and more, Eric Hanson, principal product manager at MemSQL, wrote in a post.

Additional details are available here.

Apple password manager resourcesThe new open-source project Password Manager Resources is designed to help developers of password managers collaborate to create strong passwords that are compatible with popular websites.

The project also contains collections of websites known to share a sign-in system, links to websites pages where users change passwords, and more.

By publicly documenting website-specific behaviors, password managers can offer an incentive for websites to use standards or emerging standards to improve their compatibility with password managers; its no fun to be called out on a list! the projects team wrote on GitHub.

IBM FHE toolkitIBM released a fully homomorphic encryption (FHE) toolkit for MacOS and iOS, with Linux and Android coming soon.

It was no small feat to synthesize 11 years of top-notch cryptography research into a streamlined developer experience that is accessible and freely available to anyone in the time most people would spend to brew a pot of coffee or declutter a desk, IBM wrote in a blog post.

FHE allows the manipulation of data by permissioned parties while it remains encrypted, minimizing the time it exists in its most vulnerable state.

Wipro and IBM cloud collaborationWipro partnered up with IBM to help clients accelerate their cloud journeys.

Through this alliance, Wipro will develop hybrid cloud offerings to help businesses migrate, manage and transform mission-critical workloads and applications, with security across public or private cloud and on-premises IT environments, the companies wrote in a post. Also, the launch of IBM Novus Lounge in Bengaluru will foster innovation and build industry solutions that leverage cloud, AI, machine learning and IoT.

As companies across the world continue to drive digital transformation, decision-makers must rethink radically on how to leverage the combined power of data, cloud and open source technologies to become industry leaders. Wipro IBM Novus Lounge brings together Wipros expertise across industries and IBMs open source technologies, designed to be secure and scalable across hybrid cloud, Data and AI, all running on Red Hat OpenShift promoting the journey to Cloud and journey to AI, said Gaurac Sharma, vice president of cloud and cognitive software at IBM India.

Apache weekly updatesLast week, rhe Apache Software Foundation announced Apache Hudi as a Top-Level Project. Hudi is an open source data lake technology for stream processing on top of Apache Hadoop in use at Alibaba, Tencent, Uber, and more.

New releases this week also included Apache JSPWiki 2.11.0.M7, Apache Fortress 2.0.5, and the newly identified malware campaign: Impact on Apache.

Apache Curator, a Java/JVM client library for Apache ZooKeeper, a distributed coordination service, received a 5.0 release.

Additional details on Apache releases are available here.

Originally posted here:
news digest: MemSQL 7.1, Apple releases password resources and the IBM FHE toolkit - SD Times - SDTimes.com

What is TLS? And why Transport Encryption is not sufficient? – The Android Soul

Privacy and security are the two most valuable terms in this rapidly-expanding era of technology. From regular individuals to hotshot corporations, everyone is wary of the privacy of the security of the information they are exchanging.

In the aftermath of the COVID-19 pandemic, almost all corporations have turned to video conferencing applications to keep their operations afloat. Now, with so much sensitive information flying about, the need for top-notch privacy measures isnt unwarranted.

Today, in an attempt to ease your mind, well take a look at the most popular encryption protocol that companies are using Transport Layer Security (TLS) and tell you whether its capable of making your conferences tamper-proof.

Transport Layer Security (TLS) is a widely-used security protocol that facilitates privacy and security for information exchanged over the internet. TLS is a worthy successor of the Secure Socket Layer (SSL) protocol, which was first introduced by Netscape in 1996.

TLS 1.3 is the current industry-standard. It succeeded TLS 1.2 in 2018.

Before two parties start exchanging data over a TLS connection, a sequence, called TLS Handshake, is carried out. Through the handshake, the parties agree upon the encryption keys that would be used throughout the session. TLS uses Public Key Cryptography to set the encryption/session keys over an encrypted channel. The handshake once again makes use of the Public Keys to carry out the authentication process.

After the authentication and encryption are confirmed, the data packets are signed off with a unique Message Authentication Code (MAC). This allows the clients to verify the integrity of the data packages. Once all prerequisites are met, clients can exchange data over a secure TLS connection.

Now that youre familiar with the basics of TLS, lets take a look at how it works in the real world.

For example, imagine you are texting with your friend over a TLS connection which is standard for almost all video conferencing apps and websites. Now, every text or media file you send is first encrypted and sent directly to the server. The server decrypts the package, verifies, encrypts it again, and sends it over to the intended recipient. Finally, the message is again decrypted at your friends end, allowing them to read and respond accordingly.

As mentioned, COVID-19 has directed a lot of traffic to video conferencing platforms. The likes of Zoom, Microsoft Teams, and Google Meet have benefitted greatly from the lockdown measures, but they havent particularly done enough to ensure our security.

Related: Zoom vs Google Meet

Almost all leading video conferencing platforms use Transport Layer Security or Transport Encryption to safeguard our data. And while that seems secure enough for most occasions, its hardly the gold standard of security and privacy.

Unlike End-to-End Encryption, TSL allows your server to decrypt the data you are transmitting. So, unless youre sharing public / non-sensitive info, you could deem it unnecessary and exploitation of your privacy. It also makes your messages vulnerable to government intrusion, meaning they could take harsh actions if they intended.

Additionally, in a TSL connection, the server and client computer are free to pick the form of encryption their session would have. So, they could pick a standard that isnt as robust as youd like, leaving you vulnerable to cyber-attacks.

Although this issue is usually prevalent when communicating with a secure website, its still something worth pondering over.

Read more from the original source:
What is TLS? And why Transport Encryption is not sufficient? - The Android Soul