The National Institute of Standards and Technology is re-evaluating a set of its special publications because of concerns expressed by some leading cryptographers that the National Security Agency might have corrupted the guidance.
Scientists are discovering ways to make quantum key distribution a more cost-effective and efficient way to securely share encryption keys, but there's still a long way to go before the methods can be practically applied.
Even with the latest disclosures of the efforts the National Security Agency goes through to decrypt Internet communications, enterprises can take specific steps to protect their information from prying eyes.
The NSA, in a highly classified program code-named Bullrun, used supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine encryption, according to a news report.
International markets that have implemented EMV technology are seeing reductions in card fraud, but non-EMV markets are seeing dramatic upticks, says U.K.-based card fraud expert Neira Jones.
The theft of four unencrypted computers from a Chicago area medical practice may affect 4 million patients. But the big question is: Why do breaches involving unencrypted computer devices still occur?
The National Institute of Standards and Technology has issued new guidance for designing cryptographic key management systems that describes topics designers should consider when developing specifications.
The National Institute of Standards and Technology issues a revision to the digital standard used to ensure the integrity of electronic documents and the identity of the signer.
An HHS inspector general report on the shortcomings of a government contractor's USB drive security practices is a reminder of why all healthcare organizations need to control the use of mobile storage media and ports.
Federal advisers are considering options for reinforcing the importance of risk assessments in the rules for Stage 3 of the HITECH Act's incentive program for electronic health records.
One banking association is lobbying to have merchants held more accountable for attacks against their networks and systems that breach card data. But will their efforts convince Congress?
Malware attacks against retailers are becoming more common. Many breaches linked to these attacks could be prevented, experts say, if merchants took more steps to lock down networks and point-of-sale devices.
Organizations looking at implementing encryption should consider taking a unified approach, says Karen Scarfone, who coauthored NIST's encryption guidance. Learn about her other recommendations.
This 2012 Global Encryption Trends Report, based on the independent research by the Ponemon Institute, reveals that encryption continues to be viewed as a strategic issue and that organizations are increasing their investment in encryption across the enterprise in response to compliance regulations and...
Health data breaches involving the loss or theft of unencrypted computing devices are a persistent problem, according to the most recent federal statistics. A security expert offers insights and advice.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.