Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure–as well as police, intelligence agencies, ...
In today’s digital economy, where organizations rely on cloud computing, mobile technologies and data-driven decision making, securing sensitive information has never been more critical. Encryption ...
This article appears in the Aug. 27, 2009, edition of ISO&Agent Weekly. As card-security breaches continue to hamper the payments industry, the parties involved in the transaction process are ...
What do you do when you need to perform computations on large data sets while preserving their confidentiality? In other words, you would like to gather analytics, for example, on user data, without ...