article thumbnail

Don’t Let Zombie Zoom Links Drag You Down

Krebs on Security

Many organizations — including quite a few Fortune 500 firms — have exposed web links that allow anyone to initiate a Zoom video conference meeting as a valid employee. The PMI portion forms part of each new meeting URL created by that account, such as: zoom.us/j/5551112222

article thumbnail

When Encryption Meets Flash Arrays

Thales Cloud Protection & Licensing

To combat threats and keep data safe, IT teams must employ robust encryption, key management, and access controls. To secure storage, many organizations have been leveraging native encryption offerings from their storage vendors. On the other hand, many enterprise applications now offer native encryption capabilities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The value of Key Rotation and Re-encryption.

Thales Cloud Protection & Licensing

The value of Key Rotation and Re-encryption. To meet various compliance requirements and reduce the risk of your most sensitive data getting compromised you may want to consider changing the encryption key used to protect this data. Thales refers to this changing of encryption keys as “Key rotation” or “Rekey”.

article thumbnail

NEW TECH: Breakthrough ‘homomorphic-like’ encryption protects data in-use, without penalties

The Last Watchdog

Homomorphic encryption has long been something of a Holy Grail in cryptography. Related: Post-quantum cryptography on the horizon For decades, some of our smartest mathematicians and computer scientists have struggled to derive a third way to keep data encrypted — not just the two classical ways, at rest and in transit.

article thumbnail

A Guide to Key Management as a Service

Thales Cloud Protection & Licensing

The most effective way to ensure data security is through encryption and proper key management. Key Management as a Service (KMaaS) allows companies to manage encryption keys more effectively through a cloud-based solution instead of running the service on physical, on-premises hardware.

article thumbnail

Why Enterprises Should Control Their Encryption Keys

Thales Cloud Protection & Licensing

Cloud providers have done a good job of integrating default encryption services within their core infrastructure. However, as discussed in previous blogs , the encryption service is only as secure as the keys that are used to encrypt the data. Which data within cloud workloads is encrypted. Key access information.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

For example, if you book a restaurant reservation online, you will see enough information exposed to know if certain timeslots and tables are available. 1 – Encrypt Data at Rest To prevent data leakage, unauthorized access, and physical theft organizations are increasingly looking to secure data at rest.