UK Government Reportedly Demands Access to Encrypted iCloud Files

UK Government Reportedly Demands Access to Encrypted iCloud Files

The U.K.’s office of the Home Secretary has allegedly asked Apple to provide a backdoor into any material any user has uploaded to iCloud worldwide, The Washington Post reported on Feb. 7. Anonymous sources provided The Washington Post the information and expressed concerns about tech companies being leveraged for government surveillance. Apple has not commented; however, in March, the company provided a statement to Parliament on the occasion of receiving notice of a potential request,…

Read More

Celebrating Data Privacy Day: Experts share data protection insights

Celebrating Data Privacy Day: Experts share data protection insights

January 28, 2025 marks Data Privacy Day, an international event established to raise awareness for data protection best practices. Below, cybersecurity experts are sharing their insights on essential practices for protecting sensitive data.  Cyber preparedness James Hadley, Founder and CEO of Immersive Labs, discuses the value of cyber training and preparedness. Hadley states, “In 2024, we witnessed the fallout of major record-breaking data breaches; some of which resulted in more than 100 million people having…

Read More

Why data protection is non-negotiable for every business

Why data protection is non-negotiable for every business

Every morning, I start my day by reading the news, and every morning, I see headlines about major cyberattacks and breaches causing damage to companies, brands, and people around the world. The barrage of attacks and the damage that goes with them are relentless. Attackers will always be on the lookout for soft targets, but my experience has taught me that implementing some basic yet powerful protections can shield most organizations from ransomware attacks and…

Read More

Protect 3 Devices With This Maximum Security Software

Protect 3 Devices With This Maximum Security Software

TL;DR: Protect your privacy on three devices with a 1-year subscription to Trend Micro Maximum Security for $19.99 (reg. $49.99). Cyber threats have become more sophisticated, and even cautious users can find themselves vulnerable to ransomware attacks, phishing schemes, and identity theft. A single click on the wrong link or a cleverly disguised email can lead to encrypted files, stolen credentials, or compromised accounts. Tech-savvy users know how to spot the signs of a scam…

Read More

NIST's New Post-Quantum Cryptography Standards Announced

NIST's New Post-Quantum Cryptography Standards Announced

The U.S. National Institute of Standards and Technology this week unveiled three encryption algorithms designed to resist cyberattacks, which industry observers said are a positive step toward preventing cyberattacks that break current encryption methods. The Federal Information Processing Standard (FIPS) 203, 204, and 205 provide standards for general encryption and protecting digital signatures. They were derived from multiple submissions in NIST’s post-quantum cryptography standardization project. Quantum computers are rapidly increasing the ability for high-performance computing,…

Read More

Beyond encryption: The zero-knowledge revolution for personal data

Beyond encryption: The zero-knowledge revolution for personal data

The organizations underpinning our most crucial societal functions, from financial and educational institutions to healthcare companies, suffer regularly from data breaches. This jeopardizes not just privacy, but critical day-to-day operations as the average breach results in $4.45M in financial losses. While zero-knowledge architecture has already gained traction in the security sphere, now is the time for all industries to bolster the protection of user data as threats targeting industries like finance, retail and transportation multiply…

Read More

Rethinking network and security monitoring in the age of TLS 1.3

Rethinking network and security monitoring in the age of TLS 1.3

The adoption of the Transport Layer Security (TLS) 1.3 creates a watershed moment for cybersecurity, revolutionizing encryption and data protection standards. TLS has been widely used to secure data end-to-end for many decades. Though this latest version significantly enhances the security of the TLS protocol, it also severely limits the decryption of those data streams for cybersecurity and network monitoring purposes. This results in our current forms of network and security monitoring used with previous…

Read More

New GoFetch Vulnerability in Apple's M Chips Allows Secret Keys Leak on Compromised Computers

New GoFetch Vulnerability in Apple's M Chips Allows Secret Keys Leak on Compromised Computers

The newly exposed GoFetch vulnerability affecting Apple’s M1, M2 and M3 chips lets an attacker exfiltrate secret keys from cryptographic applications on a targeted system. The exploit works by running a fraudulent process on the same CPU cluster as the targeted process on the targeted machine. No easy mitigation currently exists for this vulnerability, as it resides in the hardware. What is the GoFetch vulnerability? GoFetch is a cache side-channel vulnerability. This type of vulnerability…

Read More

The 5 pillars of cloud security for data storage

The 5 pillars of cloud security for data storage

The 5 pillars of cloud security for data storage | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Encryption bridges gap between data protection & digital identity

Encryption bridges gap between data protection & digital identity

Encryption bridges gap between data protection & digital identity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2 3 4