Encryption
Latest about Encryption

Tips for Boosting your Organisation’s Security Posture with Encryption
By IT Pro published
Sponsored Encryption should be as much a part of your cyber security as firewalls and antimalware

What are privacy-enhancing technologies (PETs)?
By Kate O'Flaherty published
In-depth As businesses need to consider privacy now more than ever, privacy-enhancing technologies (PETs) are gaining traction

WhatsApp to combat internet blackouts with proxy server support
By Rory Bathgate published
News The newest version of the communication platform offers a new way to bypass state-imposed internet limitations, but concerns remain over IP visibility

Apple steps up user security with end-to-end encryption for iCloud
By Ross Kelly published
News Apple’s new data protection feature comes as users contend with an increasingly sophisticated threat landscape

Qatar World Cup apps prompt digital privacy warnings from regulators
By Rory Bathgate published
News European regulators have voiced serious concerns over the permissions required by apps Ehteraz and Hayya

Office 365's encryption feature can be easily hacked, warns WithSecure
By Rory Bathgate published
News Researchers advise enterprises to move away from Office 365 Message Encryption, claiming its messages can be decrypted without a key

GSMA partners with IBM, Vodafone on Post-Quantum Telco Network Taskforce
By Daniel Todd published
News The three organisations will work together to create a roadmap to implement quantum-safe networking

SES, ESA and European Commission partner on satellite-based quantum cryptography system
By Praharsha Anand published
News The project will determine the course of EAGLE-1, which may launch as early as 2024
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.