The Jericho Forum is an organization pushing for innovation in e-commerce security. In this essay, Joerg Horn, head of gateway solutions at Utimaco, a Jericho Forum member, discusses combining ...
On average, it takes businesses 287 days to find and contain a data breach, giving attackers over nine months to access and steal any records they want from the database. However, encrypting those ...
Prefer Newsweek on Google to see more of our trusted coverage when you search. As hackers become increasingly sophisticated, they are targeting our personal data and stealing it at unprecedented rates ...
The world has gotten a lot more serious about privacy and data protection, but in many cases business models that rely on personalization of one kind or another have struggled to keep up. Today, a ...
Data security posture management (DSPM) tools help security teams to look at the entire data environment and find shadow data, reducing the risk of data loss. Tracking down sensitive data across your ...
It happened to me once — I lost my small 64GB USB drive I'd used for work. I was pretty sure it had nothing too important in it. But then I started wondering… what if it contained some sensitive files ...
Voltage Security announced a software tool kit for adding what is known as “format-preserving encryption” to new and legacy applications. Voltage Security announced a software tool kit for adding what ...
End-to-end encryption helps ensure that only the sender and recipient can see the contents of a message, meaning your private ...
In today’s digital age, email remains a critical tool for communication. However, it also presents a significant vulnerability, with cybercriminals continuously seeking opportunities to intercept and ...