June 02, 2016
In this Risk & Repeat podcast, SearchSecurity editors discuss Craig Wright's failed effort to prove he is bitcoin creator Satoshi Nakamoto and what that means for cryptocurrency.
May 03, 2016
Craig Wright's second attempt to prove he's the bitcoin creator, Satoshi Nakamoto, was debunked after fooling the mainstream press, but his motives are still a mystery.
April 28, 2016
PCI DSS 3.2 marks the start of refining the payment data regulations, rather than minor changes, and includes requirements to strengthen encryption and multifactor authentication.
March 23, 2016
Spreading cybercrime, like the ransomware attacks on NYT and BBC, has Congress considering Bitcoin security. Also in Searchlight: Apple might boost iCloud encryption; Amazon eyes selfie payments.
Cryptography Get Started
Bring yourself up to speed with our introductory content
The blockchain industry is hashing out how to determine a good blockchain use case, debating the usefulness of private blockchains and mapping out how regulators might benefit. Continue Reading
Blockchain in the Internet of Things has great potential, but this can't be realized without a big shift in business and economic models. Continue Reading
There's a lot of confusion when it comes to Internet of Things security; it's time to put these 10 IoT security myths to rest. Continue Reading
Evaluate Cryptography Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
As the enterprise encryption tools market matures, buyers find many vendors to choose from, but few stand out from the crowd as encryption is absorbed into other security tools. Continue Reading
Juniper firewall products were found to have two backdoor vulnerabilities. Expert Michael Cobb explains how a cryptographic algorithm and hardcoded password enabled this to happen. Continue Reading
A DROWN attack can occur through more than a third of all HTTPS connections. Expert Michael Cobb explains how DROWN enables man-in-the-middle attacks and mitigation steps to take. Continue Reading
Learn to apply best practices and optimize your operations.
Self-encrypting drives can provide added security for enterprises, but they aren't without vulnerabilities. Expert Michael Cobb explains what you need to know. Continue Reading
Implementing security for an IoT gateway is challenging. A software developer shares best practices for developing a dynamic and robust security model. Continue Reading
Recent malware issues with Lenovo's automatic update system have some worried about the risks associated with automatic updates. Experts say secure update processes are better than ever and result in less risk than waiting to patch vulnerabilities. Continue Reading
Problem Solve Cryptography Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
According to expert Gary McGraw, you're not helping yourself by believing the things -- all seven of them -- you've heard about secure software development. Continue Reading
Homomorphic encryption can be used to bypass encryption, but it's for the good of all. Application security expert Michael Cobb explains. Continue Reading
After the Heartbleed fiasco, the future of OpenSSL and open source cryptography libraries is up in the air. Application Security Expert Michael Cobb discusses whether they can -- and should -- be trusted. Continue Reading