HID’s IdenTrust Named Fastest-growing Certification Authority of the Year

HID Global®, a worldwide leader in trusted identity solutions, today announced that the power-rankings for Web technologies of the year, based on independent research conducted by the technology survey company W3Techs, have identified IdenTrust® as the fastest-growing digital certification authority in the world.  IdenTrust has issued more than 33% of all SSL certificates worldwide and…

Cryptomathic First to Add Management Capability to ‘Bring Your Own Key’ Model of Cloud Security

Cloud security pioneer, Cryptomathic, today unveils the only cloud encryption management solution to address market demand for new ‘Manage Your Own Key’ (MYOK) practices. ‘Bring Your Own Key’ (BYOK) cloud encryption solutions, which enable businesses using cloud services to generate, back up and submit their own encryption keys, have quickly gained traction among businesses that…

Protecting medical big-data

By Daniela Previtali, Wibu-Systems.   On 11 September 2016, a gang of three men drove up to a hospital in the quiet seaside town of Sande on Germany’s North Sea coast. CCTV recordings show the men walk into the hospital and come out again, unperturbed, with almost a million Euro’s worth of medical equipment stashed…

Better data security for vehicle communication with AURIX™ by Infineon and CycurHSM by ESCRYPT

The more connectivity and automated driving functions are built into cars, the more important embedded IT security becomes for vehicle communication. Infineon Technologies AG and ESCRYPT GmbH work closely together in the field of automobile cybersecurity. Both companies are now offering a solution that encrypts on-board communication and makes it more secure while considering future…

Visa ID Intelligence moves payment security beyond passwords

Visa has unveiled Visa ID Intelligence, a platform that allows issuers, acquirers and merchants to quickly adopt emerging authentication technologies and create more secure and convenient ways for consumers to shop, pay and bank on their connected devices. Available through Visa Developer Platform, Visa ID Intelligence offers a curated selection of leading third-party authentication technologies with…

Securing digital energy infrastructure: Infineon, IBM, GreenCom Networks and icentic join forces

Digitalization and distributed power generation is fundamentally changing energy systems that have been centrally supplied so far. Solar photovoltaic assets, electric vehicles, electrical heating and cooling or battery storage have to be connected into an intelligent power system. At the same time, they must be protected against the growing number of security threats. Infineon Technologies…

Blurry Box – a new encryption method for software protection from Wibu-Systems

By Wibu-Systems Auguste Kerckhoffs postulated his eponymous principle back in the 19th century: "A cryptosystem should be secure even if everything about the system, except for the key, is public knowledge". This means that an effective cryptographic method does not have to be kept secret. If it were, you should wonder why. Wibu-Systems has been…

A new encryption paradigm for a new industrial age

By Daniela Previtali, Wibu-Systems. Long before encryption became a commonplace feature of even consumer computers, while computers were still mechanical contraptions and encryption the domain of military cipher clerks, Auguste Kerckhoffs published two articles on the subject in the “Journal des sciences militaires” in 1883. He proposed several principles, one of which remains fundamental for…

%d