Remove Computer and Electronics Remove Data Privacy Remove Military Remove Security
article thumbnail

Episode 103: On the Voice-Controlled Internet, How Will We Authenticate?

The Security Ledger

But securing these interfaces has, thus far, been an afterthought. But securing these interfaces has, thus far, been an afterthought. In this podcast we speak with Ben Rafferty of the firm Semafone about the challenges of securing voice-based systems. We also talk about the challenges of securing voice based systems.

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats. As networks evolved and organizations adopted internet communications for critical business processes, these cryptographic systems became essential for protecting data.

article thumbnail

List of data breaches and cyber attacks in May 2020 – 8.8 billion records breached

IT Governance

Russian military accessed Chancellor Angela Merkel’s emails in 2015 hack (unknown). Data breaches. Advanced Computer Software Group exposed data of 190 law firms (10,000). Authorities investigating data breach at Poland’s SWPS University (unknown). Austrian village of Weiz shut down by ransomware (unknown).