With RSA’s Data Protection Manager 3.5 (now available), we are releasing into our core product a mechanism in cryptography that has been gaining steam in the recent years: format-preserving encryption (FPE). While we have been implementing FPE for years with our Professional Services teams, we felt it was now time to formally add this to [...]
Encryption & Tokenization
In his introduction to the Innovation Sandbox at RSA Conference, Hugh Thompson remarked on the critical role that small companies have in driving innovation. That’s certainly true and it was great to see the innovations of the 10 finalists who presented on Monday. But Hugh’s remark got me thinking about other dimensions of innovation, particularly in the light of the phenomenal range of capabilities evident in the exhibition hall at the conference.
In this edition of the RSA Speaking of Security Podcast, Tom Chmielarski, Practice Lead with RSA’s Advanced Cyber Defense consulting practice, talks about specific threat intelligence strategies that organizations can take in the defense against malware and advanced attackers. Tom is one of the lead consultants bringing RSA’s Next Generation Security Operations Design and Implementation [...]
As a security conscious individual, I’ve learned to educate people on the advantages of encryption. Personally, I’m a great believer of its need and one of its many users. I hardly ever access or provide personal information over any non-encrypted method. In some cases, I even refuse to provide that same information with the use of encryption if ultimately the data will be decrypted and used or placed somewhere I don’t trust. However, these days I’m often faced with having to defend the advantages of NOT always using encryption.
On January 30, the New York Times acknowledged that it had been a victim of a security breach. The Times claims this was the result of a long, targeted attack allegedly committed by attackers located in China to gain access to corporate email and data. Now it’s also coming out that the Wall Street Journal and Washington Post were also compromised in similar attacks for similar reasons.
Amy Blackshaw, Sr. Product Marketing Manager for RSA’s Identity Protection and Verification business talks about the burgeoning issue of Account Takeover fraud of online bank accounts through malware and sophisticated attacks. Amy also discusses new features being introduced in the newest version of the RSA Adaptive Authentication solution to help banks and their customers protect against these threats.
The National Institute of Standards and Technologies (NIST) announced on the 2nd of October that the winner of the SHA-3 competition is KECCAK (pronounced ketchack). Interestingly, it was 12 years ago to the day that NIST announced the Advanced Encryption Standard (AES) algorithm. Also of note is that Joan Daemen is a member of both [...]
Announcing RSA Distributed Credential Protection! Scramble, randomize and split your passwords into multiple locations #cryptocrux video-bytes
Announcing RSA Distributed Credential Protection! Scramble, randomize and split your passwords into multiple locations.
People tend to associate tokenization with payment card data, debit and credit card numbers. And while this has been the main use case for the technology, this is not the only use case.
Can a “horcrux” idea be applied to security? Watch the puzzle unfold with the #cryptocrux video-bytes
Imagine splitting up your sensitive credentials to raise the cost to an attacker…