article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Biomedical engineer Dr. Joe Alexander, the former medical director at pharmaceutical giant Pfizer, grabbed a distinguished scientist post, as well. Digital commerce exists in the form we have it today because of the Public Key Infrastructure, or PKI , our system for encrypting data and certifying its authenticity.

article thumbnail

Encryption – A Feasible Savior against Prevalent Privacy Issues in Business Communication

Security Affairs

Even though encryption should be taken seriously by businesses of all sizes, only a small fraction of the corporate sector puts their back on it. Why is Encryption a Feasible Option against Digital Threats? Encryption plays an integral role in securing the online data as well as its integrity. Final Thoughts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

The Last Watchdog

Tatsuaki Okamoto, director of NTT Research’s Cryptography and Information Security (CIS) Lab , and Dr. Amit Sahai, professor of computer science at UCLA Samueli School of Engineering and director of UCLA Center for Encrypted Functionalities (CEF). But it took massive processing power to make Gentry’s crude prototype work.

article thumbnail

A Cyber Insurance Backstop

Schneier on Security

In the first week of January, the pharmaceutical giant Merck quietly settled its years-long lawsuit over whether or not its property and casualty insurers would cover a $700 million claim filed after the devastating NotPetya cyberattack in 2017.

article thumbnail

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

Spyware can silently infect a computer, mobile device or tablet, trying to collect keystrokes, gather sensitive data, or study user behavior, all the while victims remain entirely unaware of the intrusion. Ransomware programs gain access to a computer’s file system and execute a payload to encrypt all data. Computer Viruses.