We can already see a glimpse of what tomorrow’s internet will bring. I book a train or plane ticket, and my email provider scans the receipt that is emailed tome. Then on the day of travel, my phone alerts me that I need to leave for the train or airport at a specific time, as […]
Read More
Whether you are a large or small business, academic institution, non-profit, or a government agency—cybersecurity in the workplace is everyone’s business. In honor of National Cyber Security Awareness Week, and this week’s theme, we’ve put together a few tips on how organizations can instill a culture of cybersecurity awareness, and how to protect themselves against […]
Read More
This is the second part in a three-part blog series titled “Introduction to Cloud-Native Secrets Management”. I had a lot to say so I am giving my readers the option to read the concise version below, or the more elaborate version here. Thanks guys! In the first part of the Cloud-Native blog series we introduced the […]
Read More
This is the more elaborate version of the Introduction to Cloud-Native Secrets Management: Part II series post. Click here to view the concise version. Preface In the first part of the Cloud-Native blog series we introduced the various secrets types, the technical challenges and the business implications of misusing secrets in a Cloud-Native environment. In […]
Read More
Adobe made a bit of a blunder last week when it was discovered that its product security incident response team (PSIRT) accidentally posted the private key for PGP decryption to its blog. To understand what happened, we first have to understand what a PGP private key is. PGP is a method to encrypt and/or digitally […]
Read More
Considered one of the worst data breaches in history, the credit reporting agency Equifax announced last Thursday that hackers stole records containing personal information that could affect roughly half the American population. In its Sept. 7th statement, Equifax said that consumer information accessed includes names, Social Security numbers, birth dates, addresses, and in some instances […]
Read More
Multiparty Computation (MPC) was mentioned in the US Commission on Evidence-Based Policymaking’s final report last week. The commission’s task was to “increase the availability and use of data in order to build evidence about government programs, while protecting privacy and confidentiality”. The report discusses various technologies which can increase the availability of evidence to policy makers, […]
Read More
The New York Department of Financial Services (DFS), alongside Governor Andrew Cuomo, announced last September, a series of new rules concerning cybersecurity requirements for financial firms that are regulated by the DFS in the state of New York. Given that financial firms, including banks, hedge funds, and insurers contain treasure troves of private client data, […]
Read More
Multiparty Computing (MPC) has been recognized by Gartner as an emerging technology, with Dyadic mentioned as applying revolutionary breakthroughs in mathematics to break the boundaries of hardware and still achieve the highest level of security to solve real-world encryption, authentication, privacy and key protection challenges. Dyadic uses the mathematical principles of MPC to create a […]
Read More
This is the first part in a three-part blog series titled “Introduction to Cloud-Native Secrets Management”. Cloud-Native Over the last several years, a massive transition from on-premises to the cloud is taking place, resulting in a significant increase in the adoption of Cloud-Native practices and technologies by many enterprises across various market verticals. The cloud-native […]
Read More