Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Encryption

Encryption in the Enterprise: What gets encrypted

In this webinar cut, we are going to review what kind of data should get #encrypted in the #enterprise. 👨‍💼 About the Speaker Bozhidar Bozhanov is co-founder and CEO at LogSentinel. He is a senior software engineer and solution architect with over 10 years of experience in the software industry. Bozhidar has been a speaker at numerous conferences and is among the popular bloggers and influencers in the technical field. He is one of the top-ranked users in Stack Overflow and his tech blog is recognized as one of the top Java developers blogs by international online media.

Kaseya, Sera. What REvil Shall Encrypt, Shall Encrypt

When Splunk told me we would have a “breach holiday” theme for the summer, I didn’t think it would be quite so on the nose… For those of you who have been working on this Kaseya REvil Ransomware incident over the weekend, I salute you. We’ve been doing the same. As usual, my team here at Splunk likes to make sure that we have some actionable material before posting a blog, and this time is no different.

Differences between hashing and encryption and salting explained with examples

Hashing is a one-way function that outputs a fixed-length string, where it’s impossible to decipher back into the original input. Encryption is a reversible process used to scramble data so that it can’t be read. So, if you’re looking for a way to keep your passwords safe and secure, look no further than hashing! But there is a slight catch here that relates to the term salting.

Spotlight on Technology - Encryption

In our new series, Spotlight on Technology, we invite experts from different areas of cyber security to talk to us about their specialisms. First up, we take a look at encryption with James Rees MD of Razorthorn, a cyber security consultancy & Scott Glazer from Atakama, New York based multifactor encryption software specialists. 80% of companies hit by ransomware are hit twice in a short space of time – 45% of the time by the same attacker as the initial breach. We need to take a new approach to defend against this modern day threat.

Role of Encryption in GDPR Compliance

Encryption has been a hot topic of discussion during the implementation phase of most data privacy laws. In the age where organizations are dealing with large volumes of data each day, the protection of this sensitive data is critical. The data, which is seen as a business-critical asset for organizations, should be protected against malicious hackers looking for opportunities to steal the data.

What is symmetric and asymmetric encryption? Examples & Use cases (including top mistakes)

Encryption is the process of converting plaintext data into an alternative form known as ciphertext. However, only authorised users can decipher the ciphertext back into clear-text to access the information. There are two types of encryption in widespread use, i.e. symmetric and asymmetric encryption. These names symbolise whether the same key can be used for encryption and decryption processes. These two terms: Encryption and cryptography, are often used interchangeably.