At DevSecCon London, practitioners grapple with the rise of container and serverless technology. Here are the top challenges—and insights.
The latest quantum-computing breakthrough is great, but there's still no fear of today's security encryption being broken. Here's why.
Use format-preserving hashing to anonymize sensitive data — and save your businesses money.
Complying with the GDPR's right to erasure-mandates may not be as hard as you think. Luther Martin explains.
Are you a target for state actors? Make sure you are monitoring your platforms accordingly.
Quantum computing is not the end of encryption as we know it. Quantum-resistant algorithms are available today.
Don't be the developer who screws up and lets millions of personal records out into the wild. Here's what to look out for.
Data protection laws are getting more numerous and complex. Here's what your team needs to know.
Key derivation function (KDF) can make the task of key management vastly easier and less expensive. Here's how to get started.
If the police can do it, so can thieves. Takeaway: Unmanaged BYOD is risky.

Pages