Encryption
Latest about Encryption

The government’s anti-encryption campaign shows it’s learned nothing from the war on drugs
By Connor Jones published
Opinion Criminalisation has almost always backfired through history, pushing illicit materials further into the hands of criminals

How to build a zero trust model
By Rene Millman published
In-depth Threats are becoming greater and more diverse, but having a zero trust architecture could help your business defend its infrastructure

US adds dozen Chinese tech companies to trade blacklist
By Sabina Weston published
News Decision was made due to concerns China could use the enterprises to break US encryption

Meta delays product-wide end-to-end encryption rollout until 2023
By Connor Jones published
News The company wants to 'take its time' to implement the technology in a way that both protects privacy and prevents exposure to online harms

Why the NCSC and telecoms firms are at loggerheads over quantum key distribution
By Sabina Weston published
In-depth In the face of mixed messages between the public and private sector, should businesses be wary of jumping on the bandwagon?

What should we do about encrypted messaging apps?
By Jonathan Weinberg published
In-depth From WhatsApp to Telegram to Signal, the growth in use of end-to-end encryption messaging apps is soaring. But do their positives outweigh the risks of them being used by 'bad actors'?

Multi-factor authentication deployment guide
By ITPro published
Whitepaper A complete guide to selecting and deploying your MFA authentication guide

UK gov must act now to regulate Facebook, says whistleblower
By Sabina Weston published
News Frances Haugen told members of the Online Safety Bill committee that the social network "is closing the door on us being able to act”
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.