Click to learn more about author Kanika Vatsyayan. No matter where you go, there’s a talk going on about the internet of things (IoT) and the future of IoT testing. The reasons behind it are obvious – the advantages this technology offers. Well, securing the internet of things is a many-sided effort that demands both […]
Ransomware Attacks: How to Defend Your Data
Click to learn more about author George Williams. Ransomware attacks are a common occurrence in the news nowadays. Baltimore city, Atlanta, Florida Lake city are some of the recent victims of disruptive ransomware attacks. In other news, QNAP and Synology NAS users are being targeted by ransomware attacks too. Whether you’re a professional working at […]
Ransomware’s Menace Goes Far Beyond Encryption
Click to learn more about author Linus Chang. It would be difficult these days to be unaware of the havoc ransomware can wreak. But most people’s image of “as bad as it gets” from this malicious form of malware is having your data encrypted and your money extorted in hopes that you’ll buy access to […]
Encryption Broken by Laziness
Click to learn more about author David Schlesinger. Many readers of my previous blogs have failed to ask the question “Is there really an unbreakable cipher?” Even though they have been silent, I know some of them stayed awake nights with this provocative question – I will answer it below. In Hollywood movies, a bright hacker […]
Welcome to the New World of Curating Data, Not Owning it
Click to learn more about author Richard Macaskill. Faced with the new challenges of data protection – and increased levels of oversight – many of us working with SQL Server have come to the same conclusion. Quite simply, the column names and free text descriptions available to us to describe the data in our care (or […]
Encryption, Primary Keys and Infinity
Click to learn more about author David Schlesinger. A certain area of cyber security involves encryption. This necessarily includes a good passphrase, modular math and a lot of scrambling. Good encryption produces a coded message that appears like a series of random numbers. You see, in a real series of random numbers. There is infinite entropy. […]
New Report Proposes Framework for Policymakers to Address Debate Over Encryption
by Angela Guess According to a recent press release, “A new report by the National Academies of Sciences, Engineering, and Medicine proposes a framework for evaluating proposals to provide authorized government agencies with access to unencrypted versions of encrypted communications and other data. The framework is the product of an 18-month study led by a […]
The Care and Feeding Of Your Virtual Private Networks
Click to learn more about author David Schlesinger. The Internet is a marvelous system of connected systems. It is a global phenomenon that we are still learning how to use. Telephone networks could be said to be an ancestor of the Internet, as could the earlier telegraph systems. One factor common to all these electronic communication […]
Let’s Talk Encryption
Click to learn more about author David Schlesinger. Wait! I promise – no math! Really! How encryption happens is not your job, and you may be excused from knowing the algorithms, remembering who discovered what, and why there is a secret key. Encryption systems scramble data into gibberish for protection, and then the gibberish can be […]
Ransomware – The New Cyber Protection Racket
Click to learn more about author David Schlesinger. Now that a number of newsworthy institutions such as hospitals, schools, and government offices, have fallen victim to what is called “Ransomware”, the media have finally noticed it. Ransomware, for those not yet familiar, is a pernicious type of cyber-attack where downloaded malware (i.e. “malware” is malicious software […]