Encryption
Latest about Encryption

Encryption battle plays out in Australian Parliament
By Zach Marzouk published
News The opposition said that the government is “addicted to secrecy”

Breaking end-to-end encryption would do more harm than good, warn IT professionals
By Zach Marzouk published
News Two-thirds of IT specialists said restricting the use of this technology would have a negative impact on protecting society

Avast to acquire identity services provider SecureKey
By Praharsha Anand published
News The acquisition will add to Avast’s privacy-focused identity product and services portfolio

IBM launches multi-cloud key management service
By Danny Bradbury published
News Unified Key Orchestrator will control keys on cloud and on-premises environments

How to secure business printers
By Grace Halverson last updated
In-depth Your office printer is a juicy target for hackers, so what can you do to secure it?

Encryption software market to hit $22.1 billion by 2026
By Praharsha Anand published
News The IT and telecommunications industries are expected to drive the demand

100 million Samsung Galaxy devices vulnerable to cryptographic key hack
By Connor Jones published
News Widespread flaws in hardware-backed key management could enable hackers to bypass FIDO2 authentication

FBI urges Olympic athletes to leave personal devices at home due to cyber risk
By Zach Marzouk published
News The organisation has warned that threat actors could use a broad range of cyber activities, including DDoS or ransomware attacks, to disrupt the event
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.