article thumbnail

DEEP TECH NEWS: How ‘attribute-based encryption’ preserves privacy at a fined-grained level

The Last Watchdog

Enter attribute-based encryption ( ABE ) an advanced type of cryptography that’s now ready for prime time. Customized decryption ABE builds upon digital certificates and the Public Key Infrastructure ( PKI ) that underpins secure communications across the Internet. ABE has undergone significant theoretical advancements since 2005.

article thumbnail

Scaring People into Supporting Backdoors

Schneier on Security

This is me from 2005: Beware the Four Horsemen of the Information Apocalypse: terrorists, drug dealers, kidnappers, and child pornographers. Facebook announced in March plans to encrypt Messenger, which last year was responsible for nearly 12 million of the 18.4 Facebook Messenger already has an encrypted option.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Identity-based Cryptography

Thales Cloud Protection & Licensing

out of 5 stars on Chrome web store, 9 out of 10 pairs of participants failed to complete the assigned task of exchanging encrypted emails, i.e. 90% failure rate. The most common mistake that repeatedly occurred in all of these studies [13,14,15] was to encrypt a message with the sender’s public key. This type of scheme (e.g., [8,9])

article thumbnail

And the Winner of the 2021 RSAC Innovation Contest is…

eSecurity Planet

billion in investments,” since 2005. Cape Privacy Encrypted learning privacy software 2018 New York, NY $25M. Abnormal activity related to email communications is on notice with this vendor’s service. Also Read: Tokenization vs. Encryption: Which is Better for Protecting Critical Data? Axis Security.

Cloud 126
article thumbnail

Top SD-WAN Solutions for Enterprise Security

eSecurity Planet

Built-in edge security, including encryption , URL filtering, and malware protection Cloud-agnostic branch connectivity, SaaS optimization, and IaaS integrations Application aware enterprise NGFW, Snort IPS, and malware sandboxing Microsegmentation and identity-based policy management Self-healing firmware to prevent exploitation of vulnerabilities.

Security 117
article thumbnail

Cell Phone Security and Heads of State

Schneier on Security

There are two basic places to eavesdrop on pretty much any communications system: at the end points and during transmission. The NSA seems to prefer bulk eavesdropping on the planet's major communications links and then picking out individuals of interest. Both approaches have their benefits and drawbacks.

Security 101
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Beyond Identity Identity management 2020 Private Expel Managed security service 2016 Private Tigera Zero trust for K8s 2016 Private Intrinsic Application security 2016 Acquired: VMware HackerOne Penetration testing 2015 Private Virtru Data encryption 2014 Private Cloudflare Cloud infrastructure 2010 NYSE: NET.