article thumbnail

News alert: Silence Laboratories raises $4.1M for new privacy-preserving cryptography platform

The Last Watchdog

Leveraging modern cryptography, the company already has one of the fastest distributed signature (authorization) libraries in production ( Silent Shard ), which has been audited by some of the best security auditing companies like Trail of Bits. Privacy-preserving infrastructure combined with blockchain and fintech rails is going to be huge!”

Privacy 100
article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

This article looks at the top digital forensic software tools of 2021 and what customers should consider when buying or acquiring a DSF tool. Best Digital Forensics Software Tools of 2021. The Sleuth Kit enables administrators to analyze file system data via a library of command-line tools for investing disk images. ProDiscover.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Upcoming Speaking Engagements

Schneier on Security

I’ll be on a panel at the OECD Global Blockchain Policy Forum 2020 on November 17, 2020. ” I’m speaking on “ Securing a World of Physically Capable Computers ” as part of Cary Library’s Science & Economics Series on November 17, 2020. I’ll be speaking at an Informa event on February 28, 2021.

article thumbnail

Hive ransomware gang starts leaking data allegedly stolen from Tata Power

Security Affairs

The Hive ransomware operation has been active since June 2021, it provides Ransomware-as-a-Service Hive and adopts a double-extortion model threatening to publish data stolen from the victims on their leak site (HiveLeaks). The most important change in the latest Hive variant is the encryption mechanism it adopts.

article thumbnail

New Hive ransomware variant is written in Rust and use improved encryption method

Security Affairs

The Hive ransomware operation has been active since June 2021, it provides Ransomware-as-a-Service Hive and adopts a double-extortion model threatening to publish data stolen from the victims on their leak site (HiveLeaks). .” These upgrades prove that Hive is one of the fastest evolving ransomware families in the cybercrime ecosystem.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Some technology trends such as real-time data analytics are on-going, while others are more recent, such as blockchain. Gartner (2021) has two related definitions: Digital Transformation: “can refer to anything from IT modernization (for example, cloud computing), to digital optimization, to the invention of new digital business models.”

article thumbnail

The Week in Cyber Security and Data Privacy: 20 – 26 November 2023

IT Governance

The dashboard was first spotted in June 2021. Most of the leaked data is company information and emails, but includes employee names, phone numbers, employment contract numbers and emails, as well as email attachments, metadata and other sensitive information that could be exploited in supply chain attacks.