Search Results for "encryption"

Spotlight: ShardSecure on Protecting Data At Rest Without Encryption

Host Paul Roberts speaks with Marc Blackmer of ShardSecure about that company’s new approach to protecting data at rest, which relies on fragmenting and scattering data to make it impossible to steal.

private public gears concept photo

Episode 178: Killing Encryption Softly with the EARN IT Act. Also: SMBs Struggle with Identity

In this episode of the Security Ledger Podcast sponsored by LogMeIn and LastPass: the EARN IT Act is slouching its way to passage on Capitol Hill, alarming privacy and civil liberties experts. Andrea Little Limbago of the firm Virtu joins us to talk about why EARN IT is so dangerous. Also: small and medium sized businesses are the majority of businesses in the U.S., but they are often overlooked by the companies marketing and selling security solutions. Rachael Stockton of LogMeIn and LastPass joins us to talk about SMBs struggles to manage identity and authentication challenges.

Quantum Principles Eyed to Solve Current Limitations in Encryption, Data Protection

Quantum principles are set to transform the next generation of Internet security, with new quantum-based technologies on tap to improve encryption and data communication which researchers believe could solve some of the limitations with current technology.

Lasers Eyed as Way Forward for Quantum Encryption of Data, Cryptocurrencies

Researchers at the University of Southern California have developed a technology called a frequency comb that could pave the way for quantum-encryption technologies to be used to protect mobile data and digital currencies.

Russian-Soviet Flag

Kaspersky’s Cold War(e), Unpacking DOJ’s Encryption Talk and regulating IoT

In our latest Security Ledger Podcast we talk about Kaspersky Lab’s Cold War tinged smack down with for NSA analyst Dave Aitel of Immunity Inc. Also: Bruce Schneier weighs in on what has and hasn’t changed in the Trump DOJ’s take on strong encryption, while Josh Corman of PTC tells us that federal rules governing IoT security may be closer than we think.