article thumbnail

Homomorphic Encryption Makes Real-World Gains, Pushed by Google, IBM, Microsoft

eSecurity Planet

To counter this, some major IT vendors are pushing forward with a decades-old encryption idea that was first talked about in the late 1970s but not successfully demonstrated for the first time until 2009. Since then, interest in fully homomorphic encryption (FHE) has increased, largely paralleling the rise of cloud computing.

article thumbnail

Weekly podcast: Dixons Carphone, Fashion Nexus, Yale and Alaska

IT Governance

Yale explained: “Between April 2008 and January 2009, intruders gained access to a database stored on a Yale server. They re-enlisted typewriters from closets, and wrote by hand receipts and lists of library book patrons and landfill fees at some of the 73 different buildings.”. ZDNet reports that 119,000 individuals were affected.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ten Years After: RIM Standards Evolve Slowly

Positively RIM

Every records program, not matter how good or bad, can get better Six basic areas overlap: Availability, Retention, Disposition, Protection, Compliance, and Integrity. It was largely paper-based, and its roots in library science were apparent. Both encourage improvement, not perfection.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events. This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. 119,000 individuals were affected.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

For example, organizations can re-package video libraries, songs, research, and course material for different audiences – customers, researchers, academics, students, and so on; and they can monetize the content via CaaS. first with bitcoin in 2009 and then other cryptocurrencies such as Ether and financial transactions.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

Kent: it's a little bit of a borrowed term right inside of software there are API's that you call, you know, in the libraries and stuff to move things around, and we've moved it out into the application space as kind of a way to go get data, a way to communicate between two systems. So it's typically computer to computer communication.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

Kent: it's a little bit of a borrowed term right inside of software there are API's that you call, you know, in the libraries and stuff to move things around, and we've moved it out into the application space as kind of a way to go get data, a way to communicate between two systems. So it's typically computer to computer communication.