article thumbnail

The Week in Cyber Security and Data Privacy: 16–22 October 2023

IT Governance

Incident details: The company found that data on its network had been encrypted without its knowledge. It turned out that an unauthorised party had accessed and downloaded its business records, including files containing personal data. Breached organisation: D-Link Corporation, Taiwanese networking equipment manufacturer.

article thumbnail

Spotlight: ShardSecure on Protecting Data At Rest Without Encryption

The Security Ledger

Host Paul Roberts speaks with Marc Blackmer of ShardSecure about that company’s new approach to protecting data at rest, which relies on fragmenting and scattering data to make it impossible to steal. The post Spotlight: ShardSecure on Protecting Data At Rest Without Encryption appeared first on The Security Ledger with Paul F.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Navigating the Future: Strategic Insights on Identity Verification and Digital Banking in 2024

Thales Cloud Protection & Licensing

Enterprises in these regions will adopt advanced data encryption techniques, like bring-your-own-key (BYOK) and hold-your-own-key (HYOK) systems, to meet growing demands for data sovereignty. Individuals will benefit from enhanced control over their data, backed by zero-knowledge proofs and other privacy-preserving technologies.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

Connectivity enables powerful, revenue-generating capabilities…from data telemetry and runtime analytics, to effectively predicting and maintenance requirements. There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars.

IoT 78
article thumbnail

Anatomy of a Quantum Attack

Thales Cloud Protection & Licensing

A conventional computer would need 300 trillion years to break RSA encryption – considered the gold standard for Public Key Encryption (PKE). For most commercial businesses, countermeasures against cyberattacks are about preserving data privacy, integrity, and security. NATO, the U.S.

article thumbnail

IoT Cybersecurity: 5 Major Vulnerabilities and How to Tackle Them

Security Affairs

As an example, we could use communications between systems that are not properly encrypted. Improper encryption. Hackers or other malicious sources can intercept poorly encrypted communications on the web. The Flaws in Manufacturing Process. Hackers can use this window of opportunity to steal the data.

IoT 135
article thumbnail

Key Developments in IoT Security

Thales Cloud Protection & Licensing

The good news is that security is no longer being ignored during the manufacturing of the devices. There are also data privacy implications with IoT. In the absence of good security, two obvious privacy violations include spoofing the identity of a registered user, or even spoofing the device identity itself.

IoT 100