#EncryptionTechnologies

Cyber-Defence Campuscydcampus@infosec.exchange
2024-03-04

Belinda MΓΌller, Emerging Technologies Consultant at Eraneos Switzerland, is an author of our study on Trends in Data Protection and Encryption Technologies and wrote a chapter about Hashtag#Authentication.

πŸ‘©πŸΌβ€πŸ’» Authentication verifies an entity's identity using one or more factors (something they are, have, or know).

πŸ” The authentication process can be single-factor, two-factor, or multifactor, balancing security, usability, cost, and privacy.

πŸ›‘ Trends towards more secure and user-friendly authentication also bring new privacy challenges that need addressing.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #Authentication
#DataProtection #EncryptionTechnologies #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2024-02-05

πŸ”’ Encryption Monday πŸ”’

Weyde Lin , COO and Co-Founder of qCella, is an author of our study on Trends in Data Protection and Encryption Technologies and wrote a chapter about #Tunneling and #VPN.

Tunneling involves encapsulating data packets within another packet to transport them over a network, especially when the original protocol is not supported by the host network.

While tunneling is a critical part of many VPNs, they are not the same; some VPNs do not use tunneling.

Tunneling is essential for securing remote resources, as it creates encrypted tunnels to protect against malicious interception.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #Tunneling #VPN
#DataProtection #EncryptionTechnologies #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2024-01-29

πŸ”’ Encryption Monday πŸ”’

Emilia Nunes, Senior Consultant at Eraneos Switzerland, is an author of our study on Trends in Data Protection and Encryption Technologies and wrote a chapter about #Email #Security.

πŸ“¨ Emails are vulnerable to cyber-attacks, especially phishing, due to their original design lacking cyber-attack protection.

πŸ›‘ Cryptographic measures like end-to-end encryption and Transport Layer Security can enhance email security in transit and at rest.

πŸ”’ However, emails may never be fully secure compared to new solutions designed with robust end-to-end encryption and architecture.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #EmailSecurity
#DataProtection #EncryptionTechnologies #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2024-01-22

πŸ”’ Encryption Monday πŸ”’

Sophia Ding, Emilia Nunes, Pascal Bettendorff and Weyde Lin are author of our study on Trends in Data Protection and Encryption Technologies. Together they wrote a chapter about #Biometrics.

☝🏼 Biometrics uses physiological characteristics like fingerprints and facial features for identification, often as a second-factor authentication method.

πŸ‘©β€πŸ’» Integrated biometric solutions align hardware, key generation, validation, and storage for a coherent control environment.

πŸ”’ The increasing prevalence of biometrics, especially when combined with AI systems, raises ethical and regulatory concerns.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #Biometrics
#DataProtection #EncryptionTechnologies #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2024-01-15

πŸ”’ Encryption Monday πŸ”’

Christian Cachin, professor of computer science at the University of Bern, is an author of our study on Trends in Data Protection and Encryption Technologies. He wrote a chapter about #Multi-party Threshold Cryptography

πŸ” Threshold cryptosystems distribute a private key among multiple parties using secure secret sharing, requiring cooperation of a majority for cryptographic operations.

πŸ‘©β€πŸ’» The field anticipates the emergence of standards and open-source implementations due to efforts from governmental and private sectors.

πŸ”’ It plays a crucial role in building secure distributed systems that can withstand partial component corruption.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #ThresholdCryptography #DataProtection #EncryptionTechnologies #CyberSecurity #Cryptography

Cyber-Defence Campuscydcampus@infosec.exchange
2024-01-08

πŸ”’ Encryption Monday πŸ”’

Alexander Glavackij and Sarah Ismail, former interns at the Cyber-Defence Campus and Dimitri Percia David, Professor of Data Science & Econometrics at the HES-SO Valais-Wallis are authors of our study on Trends in Data Protection and Encryption Technologies. They wrote a chapter about #Scientometric and Wikipedia Pageview Analysis.

πŸ“ˆ The analysis of data protection and encryption technologies is challenging due to rapid technological developments and varying readiness levels.

πŸ’‘ Scientometric analysis of scientific works and Wikipedia pageviews were used to gauge community and public interest in these technologies.

πŸ”’ This approach provides insights into the development and impact of data protection and encryption technologies.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #Scientometric #DataProtection #EncryptionTechnologies #CyberSecurity

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst