article thumbnail

NEW TECH: DataLocker extends products, services to encrypt data on portable storage devices

The Last Watchdog

Related: Marriott reports huge data breach Ever thought about encrypting the data held on a portable storage device? Launched as a one-man operation in 2007, DataLocker has grown into a leading manufacturer of encrypted external drives, thumb drives, flash drives and self-encrypting, recordable CDs and DVDs.

article thumbnail

MY TAKE: New tech standards, like ‘Matter’ and ‘BIMI,’ point the way to secure interoperability

The Last Watchdog

This is precisely what the consortium of software companies and device manufacturers, led Google, Amazon and Apple, set out to achieve when Matter was conceived four years ago. Matter works much the way website authentication and website traffic encryption gets executed. This same approach really could be applied to other industries.

Security 276
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts spotted a variant of the Agenda Ransomware written in Rust

Security Affairs

The Qilin ransomware-as-a-service (RaaS) group uses a double-extortion model, with most of the victims in the manufacturing and IT industries. The Rust variant has also been seen using intermittent encryption, one of the emerging tactics that threat actors use today for faster encryption and detection evasion.”

article thumbnail

SHARED INTEL: Poll shows companies pursuing ‘Digital Trust’ reap benefits as laggards fall behind

The Last Watchdog

DigiCert’s survey presents hard evidence that trust can be the basis of a winning business model. Since it was introduced two years ago, Matter has been embraced by some 400 manufacturers of IoT devices and close to one million Matter certificates have been issued, Nelson told me. It’s not just in smart homes,” he says.

article thumbnail

Calculating the Benefits of the Advanced Encryption Standard

Schneier on Security

NIST has completed a study -- it was published last year, but I just saw it recently -- calculating the costs and benefits of the Advanced Encryption Standard. On the other hand, the present value of NIST's costs from today's perspective is $127 million. IRR and investing proceeds at the social rate of return is 53.6%.

article thumbnail

A Threat to Passkeys? BrutePrint Attack Bypasses Fingerprint Authentication

eSecurity Planet

An attack like BrutePrint could present a significant threat to passkeys , an increasingly popular way to replace passwords with authentication methods like fingerprint authentication or face recognition. “SFA sensors except Touch ID do not encrypt any data and lack mutual authentication,” they wrote.

article thumbnail

Use cases of secure IoT deployment

Thales Cloud Protection & Licensing

In this article, we are going to present four use cases that demonstrate how businesses can secure devices, identities, data and software in their IoT deployments. Requirements also included that the firmware was to be signed by the manufacturer and verified by the pacemaker. Use case 1: Fortune 500 Healthcare Company.

IoT 71