Access and Feeds

Blog Archives

Homomorphic Encryption: Secure Processing of Data

By Dick Weisinger

Homomorphic Encryption is the processing of data while it remains encrypted. If it can be used, it would make the processing of data, particularly data on servers in the cloud significantly more secure. The problem is though that while the

Security: Keeping In-Process Data Confidential

By Dick Weisinger

Data security. There are three data-protection scenarios for securing data in the cloud: Data at rest. Data in transit. Data in use. Traditionally the focus on data protection has been with data at rest and data in transit. Keeping data

Security: Encrypted DNS could Thwart Hackers but also Concentrate DNS Handling to a Few

By Dick Weisinger

SSL encrypts data sent from a browser to a server, keeping that information confidential. Now more than 55 percent of all websites use SSL encryption by default. But SSL alone doesn’t plug all the potential security problems of browser to

Security: Is it Fair to Blame Humans as the ‘Weakest Link’?

By Dick Weisinger

Humans are the weakest link when it comes to security say the reports and headlines. IT professionals point the finger. Human negligence is our worst security enemy say 78 percent of IT. Theresa Payton, CEO of Fortalice Solutions , said

AI-based Cybersecurity: Benefits of Quicker Response and Lower Detection Costs

By Dick Weisinger

One-fifth of organizations say that they were victims of cyber break ins during 2018, according to a CapGemini report. And of those, 20 percent say that the costs associated with the breach totaled more than $50 million. Many think that