Customer personal information is the number one data protection priority in Taiwan reports nCipher – Yahoo Finance

Organizations racing to protect sensitive data as it proliferates across cloud, IoT devices and 5G networks

TAIPEI, Aug.11, 2020 /PRNewswire/ -- The adoption of digital initiatives such as cloud, IoT and 5G networks is growing rapidly as the world adjusts to a "new work-from-home normal" amid the COVID-19 pandemic-- with Taiwan being no exception. This brings even more attention to data protection and encryption strategies, with the protection of customer information the number one priority according to the 2020 Taiwan Encryption Trends Study published today by nCipher Security, an Entrust Datacard company and world leader in hardware security modules (HSMs), based on research by the Ponemon Institute.

nCipher Security Logo

The customer is king, but so too is intellectual property

Organizations in Taiwan have adopted enterprise encryption at a similar rate to their global counterparts: 46% have consistently applied an encryption plan/strategy, only slightly below the global average of 48%.

Protecting customer personal information is the major driver behind encryption adoption for respondents in Taiwan (62%), 8% higher than the global average. Following a close second is the protection of intellectual property (57%), well above the global average (52%). This is not surprising given the emphasis on intellectual property across the Taiwan market.

Data discovery the number one challenge

With the proliferation of data from digital initiatives, cloud use, mobility, IoT devices and 5G networks, data discovery is the biggest challenge in planning and executing a data encryption strategy, with 58% of respondents citing this as their top concern, 9% below the global average. Organizations in Taiwan also rate the challenge of initially deploying encryption technology lower than any other region, 31% vs. 44% globally.

On the other hand, respondents report greater difficulties in data classification (43%) and user training (23%), which are 12% and 9% above global averages respectively.

Trust, integrity, control

The use of hardware security modules (HSMs) to provide higher levels of trust, integrity and control for both data and applications stands at 39% for respondents in Taiwan. Most respondents (61%) say that HSMs are important as part of their organization's encryption or key management activities, with the most prevalent use cases being application level encryption (42%) and encrypting data in the cloud.

The race to the cloud

Cloud is extremely popular in the region, with 86% of respondents reporting that they transfer sensitive data to the cloud, or plan to do so within the next 12 to 24 months. Nearly every responding organization (99%) rates support for both cloud and on-premise deployment from their encryption solutions as being important, significantly higher than the global average of 67%.

Organizations in Taiwan are also deploying HSMs for cloud use cases at much higher rates than many other regions, including the ownership and operation of HSMs to generate and manage Bring Your Own Key (BYOK) and integration with a Cloud Access Security Broker (CASB) to manage keys and cryptographic operations. Taiwan also has the highest planned increase in the use of HSMs in conjunction with public cloud-based applications over the next 12 months.

Story continues

Looking ahead-- blockchain, quantum and adoption of new encryption technologies

While the surge in remote working has increased the risk of data exposure, how are organizations looking ahead? In the near term, 65% of responding organizations plan to use blockchain, with asset transaction, identity, supply chain and smart contracts cited as the top use cases.

Other much-hyped technologies are not on Taiwan IT organizations' near-term radar. Most IT professionals see the mainstream adoption of multi-party computation at least six years away, with mainstream adoption of homomorphic encryption nearly seven years away, and quantum resistant algorithms eight years out, all of which are in line with global trends.

"Consumers expect brands to protect their data from breaches and always have their best interests at heart. Our survey found that IT leaders take this trust very seriously, and often place protection of consumer data as a top priority when pursuing encryption growth," says Dr Larry Ponemon, chairman and founder of Ponemon Institute. "Encryption use is at an all-time high right now, with 46% of respondents from Taiwan this year saying their organization has an encryption plan that is applied consistently across the entire enterprise, with a further 36% saying they have a basic plan or strategy applied to certain applications and data types."

"With ongoing digitalization, organizations are under relentless pressure to deliver high security, seamless access to protect customer data and business information, while ensuring reliable business continuity. The 2020 Taiwan Encryption Trends Study highlights how critical security and identity have become for organizations and individuals both in the workplace and at home," said Percy Tu, sales manager, Taiwan, nCipher Security. "nCipher empowers customers by providing a high assurance security foundation that ensures the integrity and trustworthiness of their data, applications and intellectual property."

Other key findings from the Taiwan Encryption Trends Study include:

Download the 2020 Taiwan Encryption Trends Study

2020 Taiwan Encryption Trends Study methodology

The 2020 Taiwan Encryption Trends Study surveyed 302 IT professionals in Taiwan and is part of a larger global study, based on research by the Ponemon Institute. The report captures how organizations around the world are dealing with compliance, increased threats, and the implementation of encryption to protect their business-critical information and applications.

6,457 IT professionals were surveyed across multiple industry sectors in 17 countries/regions: Australia, Brazil, France, Germany, India, Japan, Hong Kong, Mexico, the Middle East (which is a combination of respondents located in Saudi Arabia and the United Arab Emirates), the Russian Federation, Southeast Asia (Indonesia, Malaysia, Philippines, Thailand, and Vietnam), South Korea, Taiwan, the United Kingdom, the United States and two new regions for the first time, Netherlands and Sweden.

Percy Tu, sales manager, Taiwan, nCipher Security

Percy Tu, sales manager, Taiwan, nCipher Security(Click hereto download high-resolution image)

About nCipher Security

nCipher Security, an Entrust Datacard company, is a leader in the general-purpose hardware security module (HSM) market, empowering world-leading organizations by delivering trust, integrity and control to their business-critical information and applications. Today's fast-moving digital environment enhances customer satisfaction, gives competitive advantage and improves operational efficiency-- it also multiplies the security risks. Our cryptographic solutions secure emerging technologies such as cloud, IoT, blockchain, and digital payments and help meet new compliance mandates. We do this using our same proven technology that global organizations depend on today to protect against threats to their sensitive data, network communications and enterprise infrastructure. We deliver trust for your business-critical applications, ensure the integrity of your data and put you in complete control-- today, tomorrow, always. http://www.ncipher.com

Follow us on LinkedIn, Twitter, Facebook and Instagram-- search nCipherSecurity.

Photo - https://photos.prnasia.com/prnh/20200810/2880970-1Logo - https://photos.prnasia.com/prnh/20200810/2880970-1logo

SOURCE nCipher Security

Read the original post:
Customer personal information is the number one data protection priority in Taiwan reports nCipher - Yahoo Finance

Virtru and Area 1 Security Partner to Deliver Comprehensive Cloud Email Protection – GlobeNewswire

WASHINGTON and REDWOOD CITY, Calif., Aug. 11, 2020 (GLOBE NEWSWIRE) -- Virtru, the new standard in data protection, and Area 1 Security, the first and only preemptive email security company, today announced a partnership to deliver comprehensive enterprise-class email protection. Available now, the joint offering combines Virtrus seamless email encryption with Area 1s advanced anti-phishing capabilities to help enterprises strengthen their security posture and ensure privacy and compliance while maximizing cloud collaboration and ROI.

Organizations have rapidly adopted cloud email infrastructures. According to Gartners most recent Email Security Market Guide, more than 70 percent of corporate email will be cloud-native principally Microsoft Office 365 and Google Gmail by 2021. However, the majority of these organizations use email to share and store sensitive data; 90 percent have cloud data governance challenges due to limited visibility and control; and most organizations are not compliant with data privacy regulations.

Traditional defenses such as secure email gateways (SEGs) are woefully inadequate in protecting todays cloud-driven, distributed global workforces. These approaches cannot proactively hunt threats or protect messages and attachments shared through cloud-based workflows beyond applications and perimeters, and lack the critical ease of use capabilities that ensure adoption and ROI. Further underscoring their limitations, legacy SEGs, as well as cloud email suites, routinely miss more than 30 percent of phishing campaigns the root cause of 95 percent of cyber breaches.

With a best-of-breed, comprehensive solution comprising Virtru Email Protection and Area 1 Horizon, Virtru and Area 1 seamlessly combine end-to-end encryption and advanced cloud email security. Area 1 discovers malicious sites and payloads under construction an average of 24 days before phishing campaigns launch, blocking attacks from ever reaching the inbox. Beyond the inbox, Virtru protects email messages and attachments through user friendly, end-to-end encryption that is transparently integrated into the most commonly used productivity applications, including Gmail, Google Drive, and Microsoft Outlook.

Legacy on-premise defenses that try to bolt-on features to mirror cloud architectures fail to deliver on the promise of the cloud. Traditional email gateways dont scale, dont offer anything new to Office 365 and Gmail users, and most importantly, dont prevent breaches, said Area 1 Security President and CEO Patrick Sweeney. Organizations ready to take their cloud email and messaging to the next level need cloud-native, API-first security solutions like Area 1 and Virtru.

More than 20,000 organizations worldwide trust Virtru for data security and privacy protection. And were excited to join forces with Area 1 to deliver an advanced email solution, said Virtru Co-founder and CEO John Ackerly. Though vital for connection and communication, traditional and cloud email offerings remain deficient in data-centric security controls. Area 1 and Virtru are closing the chasm between promise and protection with best-in-class email security that fosters faster adoption, facilitates secure collaboration among remote workforces, and accelerates ROI for enterprises.

Together, Virtru and Area 1 are providing organizations with:

The complete solution will be available via both companies direct sales organizations and channel partnerships.For more information on Virtrus partnership and joint solution with Area 1, please visit http://www.virtru.com/partners/area-1-security/.

About Area 1 SecurityArea 1 Security is the only company that preemptively stops Business Email Compromise, malware, ransomware and other targeted phishing attacks. By focusing on the earliest stages of an attack, Area 1 stops phish the root cause of 95 percent of breaches 24 days (on average) before they launch. Area 1 also offers the cybersecurity industrys first and only performance-based pricing model, Pay-per-Phish.

Area 1 is trusted by Fortune 500 enterprises across financial services, healthcare, critical infrastructure and other industries, to preempt targeted phishing attacks, improve their cybersecurity posture, and change outcomes.

Area 1 is cloud-native, a Certified Microsoft Partner, and Google Cloud Technology Partner of the Year for Security. To learn more, visit http://www.area1security.com, follow us on LinkedIn, or subscribe to the Phish of the Week newsletter.

About VirtruAt Virtru, we empower organizations to easily unlock the power of data while maintaining control, everywhere its stored and shared. Creators of TDF (Trusted Data Format), the open industry standard for persistent data protection, Virtru provides flexible, easy to use, and trusted privacy technologies built on its data protection platform that govern access to data throughout its full lifecycle from creation to transmission, storage, analysis, and sharing.For more information, visit http://www.virtru.com or follow us on Twitter at @virtruprivacy.

All product and company names herein may be trademarks of their respective owners.

Contact:Shannon KelleyCHEN PR for Virtruskelley@chenpr.com781.672.3132

View post:
Virtru and Area 1 Security Partner to Deliver Comprehensive Cloud Email Protection - GlobeNewswire

Bill Gates advocates for stopping end-to-end encryption (to tackle misinformation) – Reclaim The Net

Tech billionaire Bill Gates seems more present in the media these days than he has been for a long time, but hes not talking about what he knows best: how to make a lot of money in tech, stifle competition, and get away with it.

Gates is inserting himself in the debate around a medical crisis, the coronavirus epidemic, and if Wireds tone is to be believed, he is to be taken as an authoritative source on medical issues, as a self-thought epidemiologist of sorts.

This belief may stem from the fact Gates, as the report suggests, announced an upcoming pandemic in the past, and it happened just as he predicted but hes also presented as a victim of conspiracy theories and misinformation.

On that note, Gates was asked how he explains the fact that so many people are receptive to what is referred to as this anti-science worldview. But in his response, more than anything, Gates takes a swipe at end-to-end encryption and this is not the first time hes done that. It appears as if his dislike of privacy and security enjoyed by users online is as strong, if not stronger, than his self-confessed crusade against everything that anti-science is fighting. Im involved with climate change, GMOs, and vaccines.

Double your web browsing speed with today's sponsor. Get Brave.

But Gates quickly shifts gears from anti-science to calling on the government to kill off encryption in private conversations (as supposedly the reason his critics are able to communicate their thoughts and reactions to his and similar activities). And once again, Gates says this crackdown on misinformation is essential for the health and security of the web in the same breath as fraud or child pornography in an obvious attempt to vilify encryption as such.

One of the guilty apps mentioned in this context is the Facebook-owned WhatsApp, while Facebook is owned by his friend, Mark Zuckerberg.

Asked whether he has spoken about this (i.e., shuttering encryption on the messenger app) with Zuckerberg, Gates acknowledges that he has made the war on encryption his talking point now, and that Zuckerberg emailed him after he said pretty much the same things recently.

He and I do disagree on the trade-offs involved there, Gates said cryptically (probably referring to the trade-offs between security and privacy, and stomping out any (mis) information he dislikes, by any means.)

Here is the original post:
Bill Gates advocates for stopping end-to-end encryption (to tackle misinformation) - Reclaim The Net

Editor’s Pick: Here’s Why You Need an iPhone VPN – PC Tech Magazine

iPhones already come with tons of useful features, so why should you bother adding a VPN to your already-lengthy list of apps?

Well tell you exactly why you should do that in this quick article. If you were just looking for some recommendations, though, we suggest checking out some VPNs for iPhones here. Youll definitely find the best services on the market.

Not 100% Sure What a VPN Is? Heres a Quick Intro

If youre new to VPNs, or you already heard of them but are not completely sure how they work, dont skip this section. Well do our best to explain what a VPN is and how it works in very simple terms.

To start off, a VPN is an online tool that hides your IP address and encrypts your traffic. By tool, we just mean its an app you download and install on your iPhone.

Now, heres how a VPN hides your IP address:

Its pretty simple. The VPN app and the server you connect to negotiate and establish a secure connection between them (often called a VPN tunnel). Any data that passes through it is encrypted end-to-end. That means onlythe app and server can encryptand decrypt it. Thats basically why nobody can spy on your traffic when you use a VPN.

What about the encryption part?

So Why Should You Use a VPN for iPhone?

Here are fourgood reasons to head to the iTunes store and download a VPN app:

1. Unblock All the Online Content You Want

Ever tried visiting a site or watching a video only to be hit with a message saying something along the lines of Sorry, this content isnt available in your area.?

Thats geo-blocking in action content control technology that lets websites blacklist your access to certain web pages if youre not from a whitelisted geo-location. And all sites know your geo-location because they can see your IP address, which tells them:

Well, since a VPN can hide your IP address from all the sites you visit, it can help you bypass their geo-blocks. Just use a VPN server in a country where the content you want to see is available, and youre good to go.

So if you wanted tobingeshows from the US Netflix library, youd have to use a VPN server in the US.

2. Secure Your Traffic on Public Networks

Heres the thing about public WiFi its extremely convenient, but extremely dangerous too. Many networks dont even bother using encryption, so all your traffic is exposed. That means any run-of-the-mill hacker could use packet sniffers to steal sensitive data from you (like login credentials, for example).

Whats more, even the networks that use encryption arent 100% safe. The current standard (WPA2) actually has a serious vulnerability, and its successor (WPA3) isnt doing any better.

Not to mention that a hacker could easily set up their own fake network, and trick your iPhone into connecting to it. If that happens, they can monitor all your online communications.

If you use a VPN, though, you need not worry about that. It encrypts your traffic end-to-end, so nobody can compromise it not even on networks with no encryption or fake hotspots.

3. Avoid Some Phishing Attacks

By encrypting your traffic, VPNs offer some level of protection against a form of MITM (Man-in-the-Middle) attacks specifically when hackers try to redirect your connection requests to phishing sites.

Because your data packets are encrypted end-to-end, cybercriminals cant use packet sniffers to find out what sites youre visiting. Without that information, they cant successfully redirect your requests to fake sites.

After all, if youwanted to visit Twitter, and you ended up on a PayPal-looking site, youd be pretty suspicious. You might even check the URL bar and see the address looks something like this: paipaL.xy.org. At thatpoint,youdbe able to tell youre on a phishing site.

Besides that, some VPNs also offer firewall-like features that automatically block your connections to malicious domains. So hackers redirects wouldnt even work because the VPN will automatically stop your connection to their fake sites.

IMPORTANT: VPNs cant protect you from all phishing attacks. So please use antivirus protection (like Avira Mobile Security), password managers (like 1Password), and enable 2FA/MFA on all your accounts.

4. Stop Bandwidth Throttling

Thats when your ISP intentionally slows down your speeds because youre using too much data on a web app or site. They cando that because they cansee all your traffic.

With a VPN for iPhone, thats no longer a problem. Heres why:

Without that valuable information, they wont be able to selectively throttle your bandwidth anymore.

Need Help Finding a Good iPhone VPN?

We know how hard that is what with 100+ VPN services on the market.

Instead of doing hours of tiresome research, we recommend checking out some VPNs for iPhones here. Its an easy-to-scan guide from ProPrivacy that compares the best iPhone VPNs on the market.

Why Else Do You Use iPhone VPNs?

Tell us other reasons why someone should use a VPN on their iPhone in the comments. Also, if you have other information about using VPNs on iPhones, please let us know.

Read the original here:
Editor's Pick: Here's Why You Need an iPhone VPN - PC Tech Magazine

Global Quantum Cryptography Market (2020 to 2025) – Increasing Need for Integration Solutions Presents Opportunities – Yahoo Finance

Dublin, Aug. 10, 2020 (GLOBE NEWSWIRE) -- The "Quantum Cryptography Market by Component (Solutions and Services), Services (Consulting and Advisory, Deployment and Integration, and Support and Maintenance), Security Type (Network and Application Security), Vertical & Region - Global Forecast to 2025" report has been added to ResearchAndMarkets.com's offering.

The global quantum cryptography market size is estimated to be USD 89 million in 2020 and is projected to reach USD 214 million by 2025, at a CAGR of 19.1%

Major growth factors for the market include the growing incidents of cyber-attacks in the era of digitalization, increasing cybersecurity funding, rising demand of next-generation security solutions for cloud and IoT technologies, and evolving next-generation wireless network technologies. However, lack of expertise and high implementation cost could restrain the market growth.

Growing demand for integration of quantum cryptography solutions is set to fuel the growth of solutions segment

The continuous increase of data transmitted electronically has led to an increased need for and reliance on cryptography. Quantum cryptography solutions enable people to experience the same level of trust and confidence in the digital world as in the physical world. These solutions further enable millions of people to interact electronically via e-mail, eCommerce, ATMs, cell phones, etc. The quantum cryptographic solutions such as Quantum Key Distribution (QKD) platforms, QKD servers, virtual encryptors, QKD distributors, key and policy managers, SDK to integrate cryptography, quantum cryptography communication device, quantum security gateway, Quantum Random Number Generator (QRNG), hacker box, quantum secure communication network products, and repeaters, used to secure advanced cyber-attacks are in huge demand across the globe. Moreover, this solution can easily be integrated with existing security systems. Hence, the solution segment is expected to hold the highest market share in the quantum cryptography space.

North America to hold the largest market size, and to grow at the highest growth rate during the forecast period

The US is the most developed country in terms of technology adoption and investments. The widespread adoption of PCs and internet services for business purposes and storage of critical data across the world has increased the propensity of data breach and theft. In addition, the major growth factors that would drive the adoption of quantum cryptography include the growing need for data privacy and security and an increasing number of cyber-attacks. The Americas are the largest revenue contributors in the quantum cryptography market, as the market is being driven by the early adoption of advanced technologies such as cloud and IoT, high level of IT capabilities, and higher IT investments.

Key Topics Covered:

1 Introduction

2 Research Methodology

3 Executive Summary

4 Premium Insights4.1 Attractive Opportunities in the Quantum Cryptography Market4.2 Market in the Americas, by Security Type and Country4.3 Market: Investment Scenario

5 Market Overview and Industry Trends5.1 Introduction5.2 Market Dynamics5.2.1 Drivers5.2.1.1 Growing Cyber Attacks in the Era of Digitalization5.2.1.2 Increasing Cybersecurity Funding5.2.1.3 Rising Demand for Next-Generation Security Solutions for Cloud and IoT Technologies5.2.1.4 Evolving Next-Generation Wireless Network Technologies5.2.2 Restraints5.2.2.1 High Implementation Cost5.2.2.2 Lack of Expertise5.2.3 Opportunities5.2.3.1 Spur in Demand for Security Solutions Across Industry Verticals5.2.3.2 Increasing Need for Integration Solutions5.2.4 Challenges5.2.4.1 Quantum Cryptography Commercialization5.2.4.2 Technological and Implementation Challenges5.3 COVID-19 Pandemic-Driven Market Dynamics and Factor Analysis5.3.1 COVID-19 Dynamics Impacting Market Growth5.4 Industry Trends5.4.1 Quantum Cryptography Protocols5.4.1.1 Bb84 Protocol5.4.1.2 B92 Protocol5.4.1.3 Sarg04 Protocol5.4.1.4 E91 Protocol5.4.1.5 SSP Protocol5.4.2 Quantum Cryptography Types5.4.2.1 Position-Based Quantum Cryptography5.4.2.2 Device-Independent Quantum Cryptography5.4.2.3 Bounded- and Noisy-Quantum-Storage Model5.4.3 Quantum Cryptography Margins5.4.3.1 Quantum Repeaters5.4.3.2 Point-To-Point Communication5.4.3.3 Vulnerable to Attacks5.4.4 Future Scope of Quantum Cryptography5.4.5 Use Cases

6 Quantum Cryptography Market, by Component6.1 Introduction6.2 Solutions6.2.1 Increasing Need to Encrypt Critical Information Without Any Leakage6.3 Services6.3.1 Growing Need for Expert Assistance for a Customized Solution

7 Quantum Cryptography Market, by Service7.1 Introduction7.2 Consulting and Advisory7.2.1 Increasing Demand for Consultation to Resolve Hindrances for Commercial Clients' Business Growth7.3 Deployment and Integration7.3.1 Rising Need for Secure Data Transmission7.4 Support and Maintenance7.4.1 Demand for Support and Maintenance Services for the Implementation and Use of Hardware

8 Quantum Cryptography Market, by Security Type8.1 Introduction8.2 Network Security8.2.1 Growing Need to Ensure the Integrity and Usability of Network and Information8.3 Application Security8.3.1 Increasing Demand to Protect Applications from Intruders

9 Quantum Cryptography Market, by Vertical9.1 Introduction9.2 Government and Defense9.2.1 Increasing Need to Secure Confidential Data from Thefts and Unauthorized Access9.2.2 Government and Defense: COVID-19 Impact9.3 Banking, Financial Services, and Insurance9.3.1 Need to Cater to Financial Security, Online Fund Transfer Security, and Data Security9.3.2 Banking, Financial Services, and Insurance: COVID-19 Impact9.4 Retail9.4.1 Increasing Adoption of Quantum-Safe Encryption Hardware to Encrypt and Protect Customers' Confidential and Private Information9.4.2 Retail: COVID-19 Impact9.5 Healthcare9.5.1 Need to Improve the Proficiency of Clinical and IT Staff and Provide Real-Time Information Access During Emergencies Such as Pandemic9.5.2 Healthcare: COVID-19 Impact9.6 Automotive9.6.1 Increasing Demand to Provide Physical Access and Protection to Confidential Information and Critical Safety Systems9.6.2 Automotive: COVID-19 Impact9.7 Others

10 Quantum Cryptography Market, by Region10.1 Introduction10.2 the Americas10.2.1 Americas: COVID-19 Impact10.2.2 United States10.2.2.1 Increase in Funding and Adoption of Quantum Technology10.2.3 Canada10.2.3.1 Growing Need for a Developed Quantum Ecosystem10.2.4 Rest of Americas10.3 Europe10.3.1 Europe: COVID-19 Impact10.3.2 United Kingdom10.3.2.1 the Need to Deliver Quantum Encryption Systems That Enable Secure Data Transactions and Transmissions10.3.3 Germany10.3.3.1 Need to Explore the Development of Highly Secure Communication Links to Recognize Every Attack10.3.4 Rest of Europe10.4 Asia-Pacific10.4.1 Asia-Pacific: COVID-19 Impact10.4.2 China10.4.2.1 China to Gather Quantum Technology Researchers to Enhance Its Cybersecurity Space10.4.3 Japan10.4.3.1 Upsurge Demand for Quantum Communication10.4.4 India10.4.4.1 the Need to Revolutionize Future Computation and Communication Systems10.4.5 Rest of Asia-Pacific10.5 Middle East and Africa10.5.1 Middle East and Africa: COVID-19 Impact10.5.2 Middle East10.5.2.1 Growing Demand for Securing Business Content10.5.3 Africa10.5.3.1 Increasing Number of Security Initiatives

11 Competitive Landscape11.1 Overview11.2 Competitive Leadership Mapping (Start-Up/SMSE)11.2.1 Progressive11.2.2 Responsive11.2.3 Dynamic Companies11.2.4 Starting Blocks11.3 Market Ranking11.4 Competitive Scenario11.4.1 New Product Launches and Product Enhancements11.4.2 Partnerships, Collaborations, and Agreements

12 Company Profiles12.1 Id Quantique12.2 QuintessenceLabs12.3 Crypta Labs12.4 Qasky12.5 Qubitekk12.6 Isara12.7 Post-Quantum12.8 Quantumctek12.9 Magiq Technologies12.10 Nucrypt12.11 Quantum Xchange12.12 Aurea Technology12.13 Qutools12.14 Qunu Labs12.15 Infineon12.16 Mitsubishi Electric12.17 IBM12.18 Hp12.19 NEC12.20 Toshiba12.21 Microsoft12.22 Raytheon Technologies12.23 Crypto Quantique12.24 Qrypt12.25 Onboard Security (Qualcomm)

13 Adjacent/Related Market13.1 Cybersecurity Market13.1.1 Market Definition13.1.2 Market Overview13.1.3 Cybersecurity Market, by Component13.1.4 Cybersecurity Market, by Industry Vertical13.2 Quantum Computing Market13.2.1 Market Definition13.2.2 Market Overview13.2.3 Quantum Computing Market, by End-Use13.3 Encryption Software Market13.3.1 Market Definition13.3.2 Market Overview13.3.3 Encryption Software Market, by Industry Vertical

14 Appendix

For more information about this report visit https://www.researchandmarkets.com/r/111755

Research and Markets also offers Custom Research services providing focused, comprehensive and tailored research.

Follow this link:
Global Quantum Cryptography Market (2020 to 2025) - Increasing Need for Integration Solutions Presents Opportunities - Yahoo Finance

WhatsApp Users To Get This Ground-Breaking New Upgrade: Just Perfect Timing – Forbes

SOPA Images/LightRocket via Getty Images

WhatsApp may have been on a tear recently, introducing new features and updates to keep ahead of the pack, but the big one were all waiting for isnt here yet but at least its getting closer. And now we have the first solid indication as to how WhatsApp has cracked the major challenge in making this work. This will spell fantastic news for many of its 2 billion users worldwide.

As Ive reported before, the biggest missing feature with WhatsApp is its pitiful options for multiple device access. Its desktop app is clunkyand thats being kind. Its iPad app non-existent. We all know this is in the works to be fixed. Whats been unclear, though, is how that might be done while maintaining full usability on each and every one of those (up to four) linked devices.

Well, according to the ever-reliable WABetaInfo, WhatsApp has now nailed this. And, if true, thats a genuine ground-breaking achievement for the platform. It will make using WhatsApp seamless, from your phone(s) to your iPad to your desktop. And no more clunky front-end to the message store on your primary phone. This will work even if that main device is not switched on or online.

For iPad owners in particular, who have such great multiple platform options from most leading messengers now, this will be brilliant news. As WABetaInfo reports, WhatsApp has also developed aniPad app, that will be released after the activation of the feature, so you will be able to use WhatsApp on your iPhone and your iPad at the same time.

Why is this so difficult? It all comes down to end-to-end encryption. Clearly, introducing linked devices means that you need to ensure the end-to-end encryption security extends to multiple endpoints on each side of a conversation, whether person-to-person or within groups. Thats challenging but achievable. The issue, though, is that to maintain a full user experience you need to sync the entire message history across each of those devices and keep them aligned. Thats significantly harder.

Now, according to the latest indicationsgathered by WABetaInfo from within code hidden in the new beta releases of WhatsApp, the likelihood is that WhatsApp will use a local connection to transfer the message history from device to device over wifi. This means the whole process can maintain the security of that transferno external cloud service is needed, which would be a vulnerability. No word on when this will be launched, but its closer now than its ever been before.

WhatsApps closest rivalby feature if not install baseSignal, takes a similar approach to transferring an account from an old phone to a new one. But every one of its linked devices is a separate instance, with its message history limited to the time window during which it is linked. The reported WhatsApp approach is a significant step-up from that.

WABetaInfo

If those message historieswhich can be very large, mine is now 11 gigabytes, remain syncd, it extends WhatsApps famed usability into this new dimension. And while this is undoubtedly less locked down than the Signal approach, it will be perfect for almost all users. It will also be perfectly timedwith Signal and Telegram, both of which currently outdo WhatsApp on the multiple device front, fast making up ground.

There is an interesting twist behind the scenes here. The other (in my view) serious update coming from WhatsApp is to extend end-to-end encryption to cloud backups. Right now, when you backup chats to Googles or Apples cloud, you only have the protection of their encryption over your backupnot WhatsApps end-to-end protection. That means law enforcement or others can access your content with keys held by those platforms. The new update will fix this, extending the same protection from your devices to your backups.

WABetaInfo

This backup update will essentially offload a secure, central repository of your message history and media to an offline cloud service. This could provide the basis for a secure restore or even a secure live sync capabilityalthough an ongoing sync would require that backup to be decrypted and accessed while at rest in the cloud, without compromising security. That is likely a step too far, without full control over the cloud and device software, as is the case with Apples iMessage and iCloud syncing.

From what we know so far, its clear that WhatsApps considerable time spent in perfecting its approach to multiple device linking has encryption at its heart. If, for example, any of the linked devices of one of your contacts changes or if they link a new device, then you will be notified. Much in the same way as you can tell when a contact has new device or WhatsApp install.

And, ultimately, thats the most critical thing here. Other messengersincluding, of course, WhatsApps stablemate Facebook Messenger, have nailed multiple device access, but without the security we trust WhatsApp to provide. As much as we want this new functionality, we need it deployed without risking our data security and privacy. Hopefully this latest news shows that we will soon get what we both want and need.

See the article here:
WhatsApp Users To Get This Ground-Breaking New Upgrade: Just Perfect Timing - Forbes

Penta Security Acclaimed by Frost & Sullivan for IoT-Based Innovative Smart Security Solutions – PR Newswire India

Penta Security's unique spectrum of smart security solutions includes smart cars, energy, factory, and home security solutions based on its core technologies. As each environment requires a comprehensive platform that not only includes data integrity and privacy protection but also extendable and diverse systems, Penta Security has adopted a holistic approach to security solutions by extending its offerings to intelligent transport systems, data, devices, and infrastructure management systems.

"One of our main competitive advantages is our ability to customize to deliver the highest level of reliability and protection to our customers' IoT environments while decreasing the vulnerability and risks associated with the new shift," said Seokwoo Lee, CEO and Founder of Penta Security. "The rapid development of the IoT environment is accelerating the number of security threats at an unprecedented rate. Our line of IoT solutions describes our idea used incorporating the 'Secure First, Then Connect' concept that defines the importance of implementing security by design. We expect to expand our security offerings and become a cornerstone of the IoT security market."

Over the past years, the company has partnered with one of the leading telecommunications companies to build security infrastructure for electric meter units in Norway. Furthermore, the company has successfully taken part in building smart factory security infrastructure in South Korea, one of the first countries utilizing smart city technologies in the world, with a renowned hardware chip company. Penta Security is excited to be deeply associated with the IoT security industry through its business expansion in various industries worldwide.

Penta Security was presented with Asian Cyber Security Vendor of the Year by Frost & Sullivan in 2016 for its web application firewall product, WAPPLES. Additionally, the company has successfully spun off its in-house connected vehicle security solution venture AUTOCRYPT as a separate entity in 2019 to expand its solutions worldwide.

About Penta Security

Penta Security Systems Inc. is a leader in web, IoT, and data security solutions and services. With 23 years of IT security expertise in powering secured connections, Penta Security is the top cybersecurity vendor in Asia, as recognized by Frost & Sullivan, and APAC market share leader in the WAF industry. Driving innovations across encryption, authentication, and signature-free firewall detection technology, Penta Security's whole-system approach to security enables resilience in an era of hyper web integration and connectivity. For more information on Penta Security, visit http://www.pentasecurity.com. For partnership inquiries, email [emailprotected].

Photo - https://mma.prnewswire.com/media/1226015/Untitled.jpg

Home

SOURCE Penta Security

See the rest here:
Penta Security Acclaimed by Frost & Sullivan for IoT-Based Innovative Smart Security Solutions - PR Newswire India

Network Encryption Market : Complete Analysis by Experts with Growth, Key Players, Regions, Opportunities, & Forecast to 2027 – Reports Watch

Reports and Data has recently added a new research study on the Global Network Encryption Market to its ever-expanding database. The report is equipped with detailed information about the product types, applications, regions, and key players operating in the market. The report provides a comprehensive analysis of the emerging trends, key challenges, growth potential, drivers, competitive landscape, and industrial chain analysis of the Global Network Encryption industry.

The latest report is furnished with the impact analysis of the current COVID-19 pandemic on the market. The pandemic has drastically changed the dynamics of the market and has affected every aspect of life globally. The rapidly changing dynamics of the market and current and future growth potential of the market are covered in the report. The report offers crucial information about the initial and future assessment of the impact of the COVID-19 crisis on the overall market.

Get a sample of the report @ https://www.reportsanddata.com/sample-enquiry-form/1555

The report covers an exhaustive analysis of manufacturing processes, development policies, plans, product portfolio, and cost analysis. The data is represented in the form of tables, charts, graphs, diagrams, and figures.

Furthermore, the report includes an in-depth analysis of the competitive landscape. The segment offers a comprehensive overview of the company profiles along with the product profiles, production capacities, products/services, pricing analysis, profit margins, and manufacturing process developments. The report also covers strategic business measures undertaken by the companies to gain substantial market share. The report provides insightful information about recent mergers and acquisitions, product launches, collaborations, joint ventures, partnerships, agreements, and government deals.

The report provides an in-depth analysis of the competitive landscape and covers profiles of key players, along with their product portfolios and business strategies.

Key players of the market mentioned in the report are:

Cisco, Thales eSecurity, Gemalto, Juniper Networks, Nokia, Atos, Ciena, ADVA, Colt Technology Services, Rohde & Schwarz Cybersecurity, Huawei, TCC, F5 Networks, Stormshield, ECI Telecom, Aruba, Senetas, Raytheon, Viasat, ARRIS, Quantum, atmedia, PacketLight Networks, Securosys, Certes Networks.

The report analyzes various product types and applications, along with manufacturing and process analysis and cost analysis. The data is further validated via extensive primary and secondary research verified by industry experts and professionals of the profiled companies.

Component Outlook (Revenue, USD Million; 2018-2026)

Data Rate Outlook (Revenue, USD Million; 2018-2026)

Transmission medium Outlook (Revenue, USD Million; 2018-2026)

Organization size Outlook (Revenue, USD Million; 2018-2026)

End user Outlook (Revenue, USD Million; 2018-2026)

Request a discount on the report @ https://www.reportsanddata.com/discount-enquiry-form/1555

Highlights of the Network Encryption Report:

The report covers historical revenue and sales volume, and the data is validated to provide a forecast market estimation of the market size and sales numbers for key regions along with types and end-user applications. Moreover, the report also includes macroeconomic factors and regulatory policies pertaining to the Network Encryption industry for evaluation and predictive analysis.

Additionally, the report provides beneficial data about distribution, production, consumption patterns, export/import, and demand and supply ratio. The report covers the latest trends, product portfolio, demographics, regional segmentation, and regulatory framework of the Network Encryption industry.

Based on the geographical spread, the Network Encryption industry is segmented into North America, Latin America, Europe, Asia-Pacific, and the Middle East & Africa.

Request customization of the report @ https://www.reportsanddata.com/request-customization-form/1555

Highlights of the TOC of the Network Encryption Market Report:

Global Network Encryption Market Overview

Global Network Encryption Market Size and Share by Types

Global Network Encryption Market Size and Share by Applications

Global Network Encryption Market Sales and Growth Rate

Global Network Encryption Market Competitive Landscape

Global Network Encryption Market Regional Analysis

Global Network Encryption Market Forecast Estimation (2020-2027)

Global Network Encryption Market Trends, Drivers, Challenges, Risks, and Opportunities

Global Network Encryption Market Revenue, Price, and Gross Margin for Each Segment

Global Network Encryption Market Industrial Chain Analysis

Read more about the TOC in the full report.

To get the Report Description and TOC, visit @ https://www.reportsanddata.com/report-detail/network-encryption-market

Thank you for reading our report. Customization of this report is available on chapter wise section or region wise. Kindly get in touch with us to know more about the report, and our team will provide the report suited to your needs.

Here is the original post:
Network Encryption Market : Complete Analysis by Experts with Growth, Key Players, Regions, Opportunities, & Forecast to 2027 - Reports Watch

WhatsApp tests the most anticipated feature ‘expiring messages’ for privacy savvy users, and to avoid history build-up in chats and groups – Digital…

According to WABetaInfo, WhatsApp is testing a new and very exciting feature for Android users. This is going to be called expiring messages, and it basically will have the functionality of self-deleting messages.

As we all know, end-to-end encryption (E2EE) is the foundation of safe and secure messaging, and any messenger service or app that does not have E2EE is not reliable and should not be used.

WhatsApp is one of the leading messaging platforms and it is used in the entire world. To keep up with other highly competitive and challenging messaging apps like Signal and Telegram, WhatsApp keeps on testing and introducing new features. Some of them are focused on security, like encrypted multiple device access, encrypted cloud backups, Secure video calls, etc., while some features are based on less important communication factors like stickers, QR codes, web-based search for forwarded messages, etc.

This recent update about the expiring messages feature is more focused on the extended security of chat messages. Another benefit that it can provide is that self-deleting messages will not clutter the chat history. And it does not stop the users from storing screenshots or other media attachments.

This feature is already available on Signal and Telegram, and the user there can set the messages in chats and conversations to automatically disappear within few seconds to 1 week, depending on whatever option the user chooses.

This same flexibility in the duration in which messages will self-delete is most likely not going to be provided in WhatsApp. According to WABetaInfo, expiring messages will delete after a fixed period of one week. Also, this feature will be available for all chats, and any member of the chat can apply these settings in their WhatsApp, however, for groups, only admins will be able to use this feature.

It is not known yet that when this feature will officially roll out. But it surely has made people very excited and now they are highly anticipating it to be launched soon.

Then there is going to be a mute for lifetime option for chats and messages, and that is going to make life easy for a lot of people!

Recently, Whatsapp introduced a new feature that lets users search the web to verify claims in forwarded messages. This is going to put a stop on misinformation causing messages that go viral and remain un-checked!

So, all these features sound to be pretty interesting and something to look forward to.

Read next: eMarketer predicts a dramatic rise in the video viewing time and the usage of mobile apps in the US adults in 2020

Go here to see the original:
WhatsApp tests the most anticipated feature 'expiring messages' for privacy savvy users, and to avoid history build-up in chats and groups - Digital...

Client Alert: What’s the Value of a Used Laptop? – Lexology

An experienced Chief Information Security Officer (CISO) that I know, used to ask this question to new employees. He would generally receive answers that would suggest that you could possibly get $100 at a pawn shop.

This CISO would then ask, What is the value of the same unencrypted laptop with Protected Health Information?

In July 2020, Lifespan Health System Affiliated Covered Entity found out that the answer in their case is $1,040,000.

Earlier this year, Lifespans parent company reported a breach related to the theft of an employees laptop. The report noted that the Protected Health Information of 20,431 individuals was involved. The Office of Civil Rights (OCR) investigated, and OCR alleged that there was systemic noncompliance with the HIPAA Rules, including a failure to encrypt electronic Protected Health Information (ePHI) on laptops after Lifespan determined it was reasonable and appropriate to do so. OCR also uncovered a lack of device and media controls, and a failure to have a business associate agreement in place with the Lifespan Corporation. Lifespan agreed to resolve the matter for $1,040,000 and entered into a corrective action plan.

While laptop encryption is not specifically required by HIPAA, OCR has made it clear that OCR believes that encryption is required. In the OCR press release, Roger Severino, OCR Director stated, Laptops, cellphones, and other mobile devices are stolen every day, thats the hard reality. Covered entities can best protect their patients data by encrypting mobile devices to thwart identity thieves. Failure to encrypt laptops will prove expensive in the long run for an organization. You do not want to find out the value of a stolen unencrypted laptop that belongs to your company.

Now is a good time to review your HIPAA compliance with your privacy officer or an experienced health care lawyer.

Visit link:
Client Alert: What's the Value of a Used Laptop? - Lexology