article thumbnail

DEEP TECH NEWS: How ‘attribute-based encryption’ preserves privacy at a fined-grained level

The Last Watchdog

Enter attribute-based encryption ( ABE ) an advanced type of cryptography that’s now ready for prime time. ABE makes it much more difficult to fraudulently decrypt an asset in its entirety; it does this by pulling user and data attributes into the encryption picture — in a way that allows decryption to be flexible.

article thumbnail

MY TAKE: Agile cryptography is coming, now that ‘attribute-based encryption’ is ready for prime time

The Last Watchdog

Encryption agility is going to be essential as we move forward with digital transformation. All of the technical innovation cybersecurity vendors are churning out to deal with ever-expanding cyber risks, at the end of the day, come down to protecting encrypted data. Refer: The vital role of basic research.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Rising geopolitical tensions suggest a dire need for tighter cybersecurity in 2024

The Last Watchdog

and Israel, 2005 – 2010,) Operation Aurora (China, 2009,) the Sony Pictures hack (North Korea, 2015,) and WannaCry (North Korea, 2017.) The good news is that AI is coming into play across the board — in cybersecurity innovations to harden software code, manage cloud access and even make encryption more flexible and resilient.

article thumbnail

Database Encryption Key Management

Thales Cloud Protection & Licensing

Large data scale breaches have led an increasing number of companies to embrace comprehensive encryption strategies to protect their assets. According to our 2018 Global Encryption Trends Study , 43% of respondents report that their organization has an encryption strategy they apply across the enterprise, compared with 15% in 2005.

article thumbnail

Thales & LuxTrust: A Partnership for Data Sovereignty and Compliance

Thales Cloud Protection & Licensing

Many organizations are strategically partnering with specialized Managed Security Service Providers (MSSPs) as they recognize the complexity of managing cryptographic keys and encryption processes. An archiving platform ensuring long-term data preservation and protection. A consent management platform prioritizing user privacy and control.

article thumbnail

What Is DRM? Understanding Digital Rights Management

eSecurity Planet

Digital rights management (DRM) is an encryption technology that enforces creator’s rights. Digital rights management wraps digital data into an encrypted wrapper tied to a license that contains the rules for how the content may be used. The management software will also track encrypted file use and continuously enforce digital rights.

article thumbnail

Top SD-WAN Solutions for Enterprise Security

eSecurity Planet

Wide area networks have come a long way over the decades, and the introduction of cloud , edge , and virtual workloads only adds to the complexity of managing modern networks. Through the company’s cloud security solution – Cisco Umbrella, formerly OpenDNS – clients can add coverage for FWaaS, CASB, and SWG capabilities.

Security 117