Page 2,882«..1020..2,8812,8822,8832,884..2,8902,900..»

End-to-End Encryption: Important Pros and Cons – CIO Insight

According to the 2020 Cost of a Data Breach Report by Ponemon Institute and IBM Security, data breaches are costing enterprises $3.86 million on average, and theyre taking an average of 280 days to discover the problem. Clearly, hackers can and already do easily identify and access both corporate and personal information when files are transmitted from device to device unless certain cybersecurity measures are put into place. End-to-end encryption is the easiest solution for protecting this data so it doesnt get into the wrong hands.

End-to-end encryption is the practice of encrypting data and information as it passes from device to device. The sending and receiving devices can see the original contents, but no other interceptors have the correct keys to decrypt the message. This approach to cybersecurity offers many benefits to companies and users that implement the protection, but there are still some drawbacks in areas like consumer-provider relationships. Read on to learn more about how end-to-end encryption works, as well as some of the pros and cons of end-to-end encryption security.

The total number of records compromised in 2020 exceeded 37 billion, a 141% increase compared to 2019 and by far the most records exposed in a single year since we have been reporting on data breach activity. Risk Based Security 2020 Year End Report

Read Next: 2021s Most Successful Phishing Ploys (So Far)

But how does end-to-end encryption keep data encrypted while it travels? Two cryptographic keys, a public key and a private key, are generated on the senders device. The public key is public, in the sense that a public key can be generated by anyone.

However, the paired private key can only be generated by that particular sender and can only be used to decrypt data for the designated recipient device. Hackers can theoretically intercept the message in transit and service providers can access the encrypted message in order to store it, but it will remain completely illegible until it is received and decrypted by the recipient device. This practice ensures that the data can only be viewed in its true form on the sending and receiving devices, and nowhere in between.When end-to-end encryption is applied to data in transit, the data is first encrypted, or jumbled, on the sending device. The message cannot be decrypted by hackers, service providers, or anyone else until it is received by the end device.

With end-to-end encryption, private communications and other details, like timestamps and significant locations, are not easily read if intercepted by hackers or service providers like Google or Apple. When end-to-end encryption is enabled, you can rest assured that personal privacy prevails and consumer data is protected from outside viewers.

In other security setups, outside users can potentially gain access to a piece of data and manipulate its contents before it reaches the recipient (or worse, they can stop its delivery entirely). End-to-end encryption means that these malicious actors do not have the necessary key to access data in transit, so the integrity of data is maintained.

Whether its due diligence for a high-profile M&A transaction or the sharing of sensitive government intelligence data, end-to-end encryption is one solution that makes sure that no one outside of the sending and receiving parties can spread highly sensitive information. The reasons are twofold: 1) The key system in end-to-end encryption prevents unauthorized devices from opening the message. 2) If users maliciously or accidentally come across the message, end-to-end encryption has made it indecipherable to them.

Other types of encryption focus on encrypting data at the server level, but if a malicious actor or other outsider gains access to that server, they can decrypt any information in that server fairly easily. Overcoming end-to-end encryption requires hackers to perform device-level hacks to get the information that they want, which is considerably more difficult and time-consuming to do, leading most hackers to avoid those types of attacks altogether.

Lets take a look at the biggest data breach in history: Yahoos 2013 breach that compromised approximately 3 billion user accounts (all of their customers accounts at that time). Yahoo claims that no clear-text passwords or financial information were compromised in the attack, but experts believe that Yahoos outdated, easy-to-crack encryption still exposed those recordsbillions of recordsto malicious actors.

Needless to say, this attack damaged Yahoos reputation with customers, but it also damaged their negotiation powers with other major businesses. In 2017, Yahoo was in acquisition negotiations with Verizon, and after this news came to light, they were forced to lower the price of their assets by at least $350 million.

Making Security Affordable: 8 Low-Cost Ways to Improve Cybersecurity

Although end-to-end encryption offers many high-value benefits to enterprises and users, the security practice still suffers from several shortcomings and has led to some public safety concerns:

End-to-end encryption jumbles all of your datas contents in transit, but it does not hide the fact that data is being transferred. The ledger of communication remains, so people can still find records of transactions and possibly deduce the contents, based on sending and receiving parties.

End-to-end encryption does not guarantee the protection of data once it reaches the receiving device. If theres a security problem on that device or if that device falls into the wrong hands, the data has already been decrypted on the receiving device, leaving it susceptible to outside parties who gain access to the device.

One of the most important and highly controversial issues with end-to-end encryption is that its almost too successful at protecting data from third parties. This is a great feature as far as protecting private information against hackers, but what about for law enforcement and intelligence officers who need to conduct a serious investigation?

With end-to-end encryption, they cannot access evidence that has been encrypted, and neither can service providers if they are asked to cooperate in the investigation. Only participating devices can provide the information they need. In serious cases related to allegations like terrorism, murder, and physical abuse, this data protection becomes a major hindrance to public safety and national security.

Many national governments and international committees have fought against end-to-end encryption in personal devices and applications for this reason. One of the most recent end-to-end encryption ban coalitions includes India, Japan, New Zealand, Australia, the UK, and the United States. In their International Statement on End-to-End Encryption and Public Safety on October 11, 2020, they called for a ban on end-to-end encryption in apps like WhatsApp and pushed for technology companies to allow greater data access to international law enforcement forces.

Learn More About Security at CISA: Cyber Agency Launches Security Awareness Campaign

Several major companies have added end-to-end encryption features to their offerings over the years, and while some have experienced great success, others have become embroiled in controversy.

Data breaches are costing enterprises around $3.86 million per year, and that number only seems to grow, particularly in key areas of infrastructure. Although theres some controversy and concerns surrounding how end-to-end encryption works, its clear that the solution is a valuable security investment for the enterprises that select it and the consumers who benefit from it.

More on End-to-End Encryption from IT Business Edge: Enterprise End-to-End Encryption is on the Rise

Original post:
End-to-End Encryption: Important Pros and Cons - CIO Insight

Read More..

Cadence Unleashes Clarity 3D Solver on the Cloud – I-Connect007 – I-Connect007

Cadence Design Systems, Inc. announced a straightforward, secure and cost-effective approach to gaining access to compute resources in the cloud when executing 3D electromagnetic (EM) simulations with Cadence Clarity 3D Solver Cloud. Clarity 3D Solver Cloud provides the ability to scale 3D finite element method (FEM) simulation capacity from 32 cores to thousands of cores using secure connections to Amazon Web Services (AWS).

This inventive hybrid approach gives users the option to simulate using local compute resources or cloud simulation resources without having to add to either on-premises or cloud computing budgets. Cloud simulations keep design data safe on local computers while sending only encrypted simulation-specific data to the cloud. Clarity 3D Solver Cloud automatically sets up and simulates in a private and secure AWS chamber, accessing the user-defined number of compute cores. Simulation results are returned to the local on-premises computer(s) while the data in the secure AWS chamber is immediately deleted. This ensures 3D EM data is safe, protected and only discoverable on the customers local device.

Cadences approach to accelerating Clarity 3D Solver simulations on AWS allows customers to leverage high-performance cloud resources and achieve faster turnaround time, said David Pellerin, Head of Worldwide Industry Business Development, Semiconductors, AWS. We are delighted to be working with Cadence on Clarity Cloud and on future innovations that support our shared customers in their transition to cloud.

As More than Moore drives electronic systems that are higher in frequency and speed, the demand on 3D EM simulation also grows. Due to increasing design complexity, complicated by faster and faster data transfer speeds and frequency specs such as DDR5, 112G and 5G NR, Clarity 3D Solver Cloud closes the simulation versus time/compute-resources gap.

With Clarity 3D Solver Cloud, EM simulations on entire complex systems are now possible. Instead of purchasing additional on-premises compute resources to run more and more EM simulations, Cadences innovative business model provides customers with 24-hour-per-day access to the cloud. Powered by the production-proven Cadence CloudBurst Platform, Clarity 3D Solver Cloud allows the number of compute cores to be controlled by the design engineer. When additional compute nodes are needed beyond what is available locally, flexible terms are available for adding capacity to accelerate simulation time during peak usage or to decrease time-to-simulation results when simulating larger, more complex structures. The goal is to empower customers to decrease EM simulation times while expanding EM design analysis.

We continue to innovate with our system-level analysis solutions to provide unprecedented speed and accuracy, said Ben Gu, vice president of multiphysics system analysis in the Custom IC & PCB Group at Cadence. Clarity 3D Solver Cloud delivers a flexible, scalable solution for our customers so they can solve large, complex and leading-edge EM designs on demand, without waiting for compute resources to become available. The hybrid cloud approach keeps design data secure on-premises, provides a straightforward and familiar user experience for our Clarity 3D Solver customers, and most importantly, accelerates EM results using state-of-the-art AWS compute resources to generate 3D FEM electromagnetic analysis results.

Endorsements

Simulation to ensure first-time right designs is a prerequisite for success in a high-speed interconnect system, and the ability to rapidly deliver these advanced technology services enhances Sanminas solution offerings to our leading-edge customers. The Clarity 3D Solver provides unsurpassed speed and capacity, and now, with the new cloud solution, we can quickly respond to demanding simulation needs without front-end loaded capital expenses and delays from procurement of compute resources. In addition, the convenience of running large simulations from our notebook computers allows us to optimize IT budgets without impacting engineering productivity.

Drew Doblar, VP of Engineering, at Sanmina Corporation

Inventec serves our customers with excellence because of our innovation, quality, open mind and execution. Fast and accurate simulation of our designs used in cloud computing, wireless communication, intelligent devices and IoT ensures we can deliver working prototypes in the shortest possible time. Cadence has long been our trusted partner to provide simulation solutions that tightly integrate with our design tools to help us rapidly find and fix design problems. We utilize Clarity 3D Solver with on-premises hardware, but with the new Clarity 3D Solver Cloud, we have access to unlimited compute resources with zero wait time, allowing us to more quickly optimize our designs. This reduces our turnaround time and enables us to produce more robust products with fewer design iterations.

Steven Ting, Director at Inventec

At Enflame Technology, our AI chips need to be delivered in reliable hardware to serve our downstream partners. We cannot afford multiple design respins, so we trust Cadence to provide us with integrated design and analysis solutions to enable us to streamline system-level design. The Clarity 3D Solver has provided unparalleled speed and capacity with proven accuracy. We utilize Clarity 3D Solver Cloud to break the bottleneck during peak demand simulation times as it gives us access to unlimited compute resources, allowing us to take full advantage of the scalability of Clarity technology to enable true 3D simulation results. This makes our design cycles predictable and increases company-wide productivity.

Arthur Zhang, Founder and COO of Enflame Technology

Availability

The Clarity 3D Solver Cloud technology supports Cadences Intelligent System Design strategy, enabling system innovation. Clarity 3D Solver Cloud is available today. Customers can learn more at http://www.cadence.com/go/Claritycloud as well as register for the on-demand EM Forum event where Clarity 3D Solver Cloud will be discussed in detail.

About Cadence

Cadence is a pivotal leader in electronic design, building upon more than 30 years of computational software expertise. The company applies its underlying Intelligent System Design strategy to deliver software, hardware and IP that turn design concepts into reality. Cadence customers are the worlds most innovative companies, delivering extraordinary electronic products from chips to boards to systems for the most dynamic market applications, including consumer, hyperscale computing, 5G communications, automotive, mobile, aerospace, industrial and healthcare. For seven years in a row, Fortune magazine has named Cadence one of the 100 Best Companies to Work For. Learn more at cadence.com.

Continue reading here:
Cadence Unleashes Clarity 3D Solver on the Cloud - I-Connect007 - I-Connect007

Read More..

5 Trends Shaping the Future of Encryption – Cyber Security Hub

Cloud computing has made securing data harder than ever. Compounding these challenges, especially in complex, multi-cloud environments, is the ever-growing number of encryption and key management solutions enterprises are using. In addition, 64% of companies say that it is unclear as to who owns key management, making this area especially problematic.

To combat these issues, companies are developing enterprise-wide encryption strategies. According to the Entrust 2021 Global Encryption Trends study, over 50% of organizations have implemented a single, comprehensive data encryption strategy across the entire enterprise, double the amount reported in 2011. In addition, to help strengthen key generation and management, 66% of companies are turning towards hardware security modules (HSMs).

Bring your own encryption (BYOE), also known as bring your own key (BYOK), refers is an encryption model where the data owner generates and uses its own cryptographic keys and, ideally, has sole access to them. Though designed as a way to help to increase data protection in the cloud without having to turn to a 3rd party key management vendor, BYOE and BYOK are not without their weaknesses.

Over the past 5 years, blockchain has proven to be an effective platform for secure and decentralized information exchange. First and foremost, blockchain automates the data storage process making human-error related data breaches obsolete. As data is decentralized, encrypted, and cross-checked by multiple nodes on the network, blockchain networks are close to impossible to hack.

Banks, governments, hospital systems and other large organizations tasked with managing high volumes of sensitive data are all experimenting with using blockchain technologies for cybersecurity purposes. However, blockchain remains prohibitively expensive and challenging to implement for most organizations. As the technology is still in its nascent stages, scalability and interoperability remain major obstacles to implementations as do the enduring difficulties of encryption key management.

Though conceptualized in 1978, homomorphic encryption is just now becoming a reality. A technique that allows for computations to be performed on encrypted data without a key, homomorphic encryption enables data owners or a third party (such as a cloud provider) to apply functions on encrypted data without needing to reveal the values of the data. The results are also encrypted and require a key to access.

When combined with blockchain, homomorphic encryption could usher in a new era of agile, highly resilient cybersecurity and encryption strategies. However, like blockchain, homomorphic encryption requires significant computing power to function and remains, for now, prohibitively expensive. Given its potential though, many key industry players such as IBM, Microsoft and AWS are all researching and developing homomorphic encryption solutions.

Quantum computing is poised to render current cryptography techniques obsolete. In fact, there is near scientific consensus that quantum computers will be able to break widely used public-key cryptographic schemes such as RSA and Diffie-Hellman. Furthermore, the transition to new quantum resistant cryptographic algorithms will take years.

Thankfully we have a head start. Not only are researchers developing new, quantum resistant encryption methodologies, some already exist. Lattice-based, code-based, hash-based, isogeny-based, and multivariate systems are all examples of quantum-resistant PKC systems.

See the article here:
5 Trends Shaping the Future of Encryption - Cyber Security Hub

Read More..

Thailand Data Center Market Size to Reach Revenues of USD 1015 Million by 2026 – Arizton – PRNewswire

CHICAGO, June 2, 2021 /PRNewswire/ -- In-depth analysis and data-driven insights on the impact of COVID-19 included in this Thailand data center market report

Thailand data center marketsize is expected to grow at a CAGR of over 7.99% during the period 20202026. Thailand data center market research report includes market size in terms of area, investment, power capacity, and colocation revenues. Get insights on 31 existing data center and 3 upcoming facilities spread across 7+ locations.

Key Highlights Offered in the Report:

Key Offerings:

Get your sample today! https://www.arizton.com/market-reports/thailand-data-center-market-size

Thailand Data Center Market Segmentation

Market Segmentation by IT Infrastructure

Market Segmentation by Electrical Infrastructure

Market Segmentation by Mechanical Infrastructure

Market Segmentation by General Construction

Market Segmentation by Tier Standard

Thailand Data Center Market Dynamics

In 2020, the Thailand government approved USD 146 million for the deployment of the cloud region to be used by government agencies. The Government Data Center and Cloud (GDCC) will be used as a central cloud system. In 2019, Tencent and True IDC announced to launch the Thailand's first Artificial Intelligence (AI) based cloud platform that provides cloud services to both private and public sectors. Thailand's cloud computing market expects to reach around USD 700 million by 2026, generating around 30,000 cloud computing jobs in the next five years. According to the Asia Cloud Computing Association (ACCA), the Cloud Readiness Index (CRI) Thailand raised its position in 2020 due to the rise in its connectivity and the implementation of the Personal Data Protection Act and risk protection measures.

Key Drivers and Trends fueling Market Growth:

Thailand Data Center Market - Existing Vs. Upcoming Data Centers

Get your sample today! https://www.arizton.com/market-reports/thailand-data-center-market-size

Key Market Participants

IT Infrastructure Providers

Data Center Construction Contractors & Sub-Contractors

Support Infrastructure Providers

Data Center Investors

Explore our data center knowledge base profile to know more about the industry.

Read some of the top-selling reports:

About Arizton:

AriztonAdvisory and Intelligence is an innovation and quality-driven firm, which offers cutting-edge research solutions to clients across the world. We excel in providing comprehensive market intelligence reports and advisory and consulting services.

We offer comprehensive market research reports on industries such as consumer goods & retail technology, automotive and mobility, smart tech, healthcare, and life sciences, industrial machinery, chemicals and materials, IT and media, logistics and packaging. These reports contain detailed industry analysis, market size, share, growth drivers, and trend forecasts.

Arizton comprises a team of exuberant and well-experienced analysts who have mastered in generating incisive reports. Our specialist analysts possess exemplary skills in market research. We train our team in advanced research practices, techniques, and ethics to outperform in fabricating impregnable research reports.

Contact:

Mail: [emailprotected]Call: +1-312-235-2040

SOURCE Arizton Advisory & Intelligence

Read more:
Thailand Data Center Market Size to Reach Revenues of USD 1015 Million by 2026 - Arizton - PRNewswire

Read More..

Duality Technologies and Intel Collaborate to Deliver Optimized Homomorphic Encryption Applications – PRNewswire

NEWARK, New Jersey, June 2, 2021 /PRNewswire/ --Duality Technologies, a leading provider of Privacy-Enhancing Technologies (PETs) based on Fully Homomorphic Encryption (FHE), announced today that it has partnered with Intel to deliver optimized Data Science and AI applications for privacy-enhanced data collaboration. Leveraging Duality's expertise in FHE and data science with Intel's leadership in hardware platforms, the two companies have collaborated to accelerate FHE on the new 3rd Gen Intel Xeon processors with built-in AI plus encryption accelerators. By optimizing FHE performance on Intel platforms, the integration will make privacy-preserving data analytics scalable, enabling enterprises to collaborate on sensitive data while simultaneously preserving theprivacy and confidentiality of personal information, as well as maintaining full compliance with data privacy regulations throughout theanalytics cycle.

In today's data-driven economy, there is a rapidlygrowing need for collaboration across organizations seeking to derive value and insights from their data sets. A recent Gartner report identified privacy-enhancing computation as a top strategic technology trend for 2021, stating that "by 2025, half of large organizations will adopt privacy-enhancing computation for processing data in untrusted environments and multiparty data analytics use cases." Using PETs,enterprises cannavigate today's landscape of growing privacy regulations and successfullycollaborate on data across borders and institutions. PETs based on hardware-enhanced FHE protect data in use by preventing exposure of sensitive data, such as personally identifiable information (PII), during analysis, therebyensuring compliance with growing data privacy regulations.

"By joining forceswith Intel, we have already achieved most impressive FHE acceleration results. Duality and Intel share the objective of accelerating FHE and its applications by orders of magnitude, enabling organizations around the world to benefit from secure and privacy enhanced data collaboration", said Dr. Alon Kaufman, CEO and Co-Founder, Duality Technologies. "In an era in which data utility and data privacy are both paramount, we are excited to enableIntel customers to collaborateand generate insights from encrypted data without revealing sensitive information. Duality SecurePlus scalable and practical AI applicationspave the way for the widespread adoption of this transformativeprivacy-enhancing technology."

"The need for actionable big data insights has never been greater. With 3rd Gen Intel Xeon processors, DualitySecurePlus applicationscan simultaneously address privacy, security, confidentiality and scalability challenges in a manner which can benefit organizations across many industries," said Jeremy Rader, General Manager of Enterprise Strategy & Solutions, Data Platforms Group at Intel.

Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries.

About Duality Technologies

Duality Technologies is at the forefront of Privacy Enhancing Technologies (PETs), setting thestandard for privacy-preserving data collaboration. Duality SecurePlus, a leading PET platform, combines advanced Homomorphic Encryption and data science, enabling organizations to derive insights without exposing their sensitivedata. Duality's products are used by companies across regulated industries including financial services, healthcare, telecommunications and more. Duality was listed on Fast Company's 2020 Most Innovative Companies List in the Data Science category and has been recognizedas a Gartner "Cool Vendor" for Privacy Preservation in Analytics.For more information, please visit dualitytech.com.

Duality Technologies Media Contact:Ben CromeHeadline Media(914) 336-4922[emailprotected]

SOURCE Duality Technologies

Homepage

Read the original post:
Duality Technologies and Intel Collaborate to Deliver Optimized Homomorphic Encryption Applications - PRNewswire

Read More..

Top Benefits that Help in Boosting the Growth of the Email Encryption Market – TechBullion

Share

Share

Share

Email

The mobility, flexibility, and reliability of emails have increased extensively over the years. With an increase in the number of email users around the world, the threats related to emails such as phishing, data breaches, and others have increased considerably. Necessity is the mother of invention. The growing prevalence of such cases led to the invention of email encryption services and solutions. It emerged in popularity in no time. The rising demand for email encryption services from many individuals will bring tremendous growth opportunities.

Email encryption is a method of converting the information in the email in an encrypted form. Once the content of the email is encrypted, it will not be readable to outsiders. The content is reversed back to its decrypted form once it is unlocked with the private email key. The convenience and advantages attached to these services will prove to be good growth generators for the email encryption market.

According to the analysts at Transparency Market Research (TMR), the email encryption market is expected to expand at a healthy CAGR of ~25 percent across the assessment period of 2020-2030. The extensive benefits of the services will add extra stars of growth to the email encryption market.

A wide range of advantages is responsible for the rising demand for email encryption services. Many companies and organizations are choosing these services for preventing data leakage. The heightening awareness among diverse companies and firms regarding the importance of data protection will bring immense growth opportunities.

Here are some major benefits that help in increasing the growth rate of the email encryption market.

Request Brochurefor Email Encryption Market Report

Protection of Confidential Information

Email encryption provides the protection of confidential information such as social security numbers, credit card numbers, official information, etc. Some hackers may make use of this information for ulterior motives. To prevent such hazards, email encryption becomes necessary.

Affordable and Advanced

When an email service is already encryption-integrated in the server, the need for purchasing additional equipment becomes null. A trusted email encryption service provider enables server integration that makes it affordable. This factor will help in boosting the growth prospects of the email encryption market. Furthermore, the integration of additional features without any extra cost invites exponential growth.

Eliminates Spam

When an individual sends encrypted mail, the receiver can see the digital signature on the mail to verify the sender. Spoofed emails do not contain the signature. Hence, the use of email encryption assists in eliminating spam mail.

Saves Time

The utilization of email encryption enables risk-free sending of the mails without any additional requirement of protection. Earlier, for sending confidential information, mails had to be programmed with a large set of codes and then sent. Email encryption services have an inbuilt encryption mechanism which helps in saving a lot of time. This advantage will help in increasing the demand for email encryption services.

Helps in Staying Compliant-Friendly

The government bodies of numerous countries have made encryption mandatory for certain sectors like healthcare. Criminal Justice Information Services (CJIS) has mandated that any sensitive data in a secure location has to be encrypted before sending. The Health Insurance Portability and Accountability Act (HIPAA) also make the protection of patient health information through email information compulsory through email encryption. All these factors bode well for the growth of the email encryption market.

No companies, whether big or small want to be victims of a data breach. Email encryption plays a gigantic role in keeping the information secure. Along with email encryption, the players also provide additional encryption services and features, which further bring promising growth for the email encryption market.

TMR offers custom market research services that help clients to get information on their business scenario required where syndicated solutions are not enough,request for custom research report

View original post here:
Top Benefits that Help in Boosting the Growth of the Email Encryption Market - TechBullion

Read More..

Baffle Brings the Holy Grail of Encryption to Amazon RDS – Yahoo Finance

The First and Only Solution to Power Advanced Reporting and Analytics on De-identified and Encrypted Data on Amazon RDS

Baffle, Inc., a cloud data protection company, today announced it has extended its advanced multiparty compute capabilities to support Amazon Relational Database Service (Amazon RDS). An AWS Technology Partner, Baffle Data Protection Services (DPS) enables de-identification, encryption, and masking of data in the cloud to ensure compliance with data privacy regulations and reduce the risk of data breaches and leaks.

Baffle is the first and only vendor that allows customers to migrate data to the cloud, simultaneously de-identify the data, and seamlessly facilitate reporting and analytics on Amazon RDS. This comprehensive data protection capability operates with no impact on business intelligence or analyst functions. Baffles secure computation capability simplifies data protection by addressing customer concerns over exposed data in cloud database platforms. The solution leaves data de-identified in Amazon RDS and still allows operations, reporting, and computation to occur. Baffle DPS enables customers to not only accelerate their move to the cloud to deliver agility and speed to the business, but also enable a cloud-native, data security model.

"Organizations are consolidating their data to the cloud at a record pace, and according to Gartner, 75% of all data will be in the cloud by 2022," said Ameesh Divatia, Baffles co-founder and CEO. "Baffle is thrilled to bring its advanced secure computation capabilities to Amazon RDS to help further accelerate the adoption of AWS cloud services and ensure data privacy."

Learn how Baffle Data Protection Services integrates with Amazon environments to more easily and confidently migrate, store, and share cloud data.

About Baffle

Baffle secures data in the cloud and when shared across the entire analytics pipeline with no performance impact on the user experience. Proven in large-scale environments, only the Baffle Data Protection Services de-identifies sensitive information with zero application changes so companies can responsibly move more data, faster, to the cloud for privacy-preserving analytics in artificial intelligence (AI) and machine learning (ML). Investors include True Ventures, Clearvision Ventures, ServiceNow Ventures [NYSE: NOW], Greenspring Associates, Thomvest Ventures, Engineering Capital, Industry Ventures, and Triphammer Ventures. Follow us on Twitter and LinkedIn.

Story continues

View source version on businesswire.com: https://www.businesswire.com/news/home/20210602005307/en/

Contacts

Davida DinermanLook Left Marketingbaffle@lookleftmarketing.com (508) 561-4263

Read this article:
Baffle Brings the Holy Grail of Encryption to Amazon RDS - Yahoo Finance

Read More..

Why Indian Courts Should Reject Traceability Obligations – EFF

End-to-end encryption is under attack in India. The Indian governments new and dangerousonline intermediary rulesforcing messaging applications to trackand be able to identifythe originator of any message, which is fundamentally incompatible with the privacy and security protections of strong encryption, due onMay 25th. Three petitions have been filed (Facebook; WhatsApp; Arimbrathodiyil) asking the Indian High Courts (in Delhi and Kerala) to strike down these rules.

The traceability provisionRule 4(2) in the Intermediary Guidelines and Digital Media Ethics Code rules (English version starts at page 19)was adopted by the Ministry of Electronics and Information Technology earlier this year. The rules requireany large social media intermediary that provides messaging shall enable the identification of the first originator of the information on its computer resource in response to a court order or a decryption request issued under the 2009 Decryption Rules. (The Decryption Rules allow authorities to request the interception or monitoring of decryption of any information generated, transmitted, received, or stored in any computer resource.)

The minister has claimed that the rules will [not] impact the normal functioning of WhatsApp and said that the entire debate on whether encryption would be maintained or not is misplaced because technology companies can still decide to use encryptionso long as they accept the responsibility to find a technical solution, whether through encryption or otherwise that permits traceability. WhatsApp strongly disagrees, writing that "traceability breaks end-to-end encryption and would severely undermine the privacy of billions of people who communicate digitally."

The Indian government's assertion is bizarre because the rules compel intermediaries to know information about the content of users messages that they currently dont and which is currently protected by encryption. This legal mandate seeks to change WhatsApps security model and technology, and the assumptions somehow seem to imply that such matter neednt matter to users and neednt bother companies.

Thats wrong. Because WhatsApp uses a specific privacy-by-design implementation that protects users secure communication by making forwarding indistinguishable for the private messaging app from other kinds of communications. So when a WhatsApp user forwards a message using the arrow, it serves to mark the forward information at the client-side, but the fact that the message has been forwarded is not visible to the WhatsApp server. The traceability mandate would make WhatsApp change the application to makethis information, which was previously invisible to the server, nowvisible.

The Indian government also defended the rules by noting that legal safeguards restrict the process of gaining access to the identity of a person who originated a message, that such orders can only be issued for national security and serious crime investigations, and on the basis that it is not any individual who can trace the first originator of the information. However, messaging services do not know ahead of time which messages will or will not be subject to such orders; as WhatsApp has noted,

there is no way to predict which message a government would want to investigate in the future. In doing so, a government that chooses to mandate traceability is effectively mandating a new form of mass surveillance. To comply, messaging services would have to keep giant databases of every message you send, or add a permanent identity stamplike a fingerprintto private messages with friends, family, colleagues, doctors, and businesses. Companies would be collecting more information about their users at a time when people want companies to have less information about them.

India'slegal safeguards will not solve the core problem:

The rules represent a technical mandate for companies to re-engineer or re-design their systems for every user, not just for criminal suspects.

The overall design of messaging services must change to comply with the government's demand to identify the originator of a message. Such changes move companies away from privacy-focused engineering and data minimization principles that should characterize secure private messaging apps.

This provision is one of many features of the new rules that pose a threat to expression and privacy online, but its drawn particular attention because of the way it comes into collision with end-to-end encryption. WhatsApp previously wrote:

Traceability is intended to do the opposite by requiring private messaging services like WhatsApp to keep track of who-said-what and who-shared-what for billions of messages sent every day. Traceability requires messaging services to store information that can be used to ascertain the content of peoples messages, thereby breaking the very guarantees that end-to-end encryption provides. In order to trace even one message, services would have to trace every message.

Rule 4(2) applies to WhatsApp, Telegram, Signal, iMessage, or any significant social media intermediaries with more than 5 million registered users in India. It can also apply to federated social networks such as Mastodon or Matrix if the government decides these pose a material risk of harm to national security (rule 6). Free and open-source software developers are also afraid that theyll be targeted next by this rule (and other parts of the intermediary rules), including for developing or operating more decentralized services. So Facebook and WhatsApp arent the only ones seeking to have the rules struck down; a free software developer named Praveen Arimbrathodiyil, who helps run community social networking services in India, has also sued, citing the burdens and risks of the rules for free and open-source software and not-for-profit communications tools and platforms.

This fight is playing out across the world. EFF has long said that end-to-end encryption, where intermediaries do not know the content of users messages, is a vitally important feature for private communications, and has criticized tech companies that dont offer it or offer it in a watered-down or confusing way. Its end-to-end messaging encryption features are something WhatsApp is doing rightfollowing industry best practices on how to protect usersand the government should not try to take this away.

See the original post here:
Why Indian Courts Should Reject Traceability Obligations - EFF

Read More..

Ending encryption: On enforcing traceability on popular messaging apps – The Hindu

Barely a day before the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules 2021 came into force, WhatsApp moved the Delhi High Court against the rules specifically the one that mandates that a significant social media intermediary providing services primarily in the nature of messaging shall enable the identification of the first originator of the information on its computer resource as may be required by a judicial order. Given the specification that a significant social media intermediary is one with more than 50 lakh registered users, WhatsApps messenger service would clearly be affected. WhatsApps contention is that for compliance and traceability, it would have to break its end-to-end encryption service that allows messages to be read only by the sender and the receiver. Its argument is that the encryption feature allows for privacy protections and breaking it would mean a violation of privacy. The question to be asked is whether the traceability guidelines (by breaking encryption) are vital to law enforcement in cases of harmful content. A release by the Ministry of Electronics and IT has said that the traceability measure will be used by law enforcement as the last resort and will come by only in specific situations, such as for the purposes of prevention, detection, investigation, prosecution or punishment of an offence related to the sovereignty and integrity of India... or child sexual abuse material, punishable with imprisonment.... The assertion suggests that this requirement is in line with the Puttaswamy judgment that clarified that any restriction to the right of privacy must be necessary, proportionate and include safeguards against abuse.

But the Government, as the law stands now, can already seek access to encrypted data under Section 69(3) of the IT Act, and Rules 17 and 13 of the 2009 Surveillance Rules that require intermediaries to assist with decryption when they have the technical ability to do so and when law enforcement has no other alternative. Besides, it can still seek unencrypted data, metadata and digital trails from intermediaries such as WhatsApp. The trouble with enforcing traceability is that without safeguards such as having any independent or judicial oversight, government agencies could seek any users identity on vague grounds and this could compromise the anonymity of whistle-blowers and journalistic sources, who can claim to be acting in the public interest. WhatsApps contention that requiring messaging apps to trace chats is the equivalent of asking us to keep a fingerprint of every single message sent... and fundamentally undermines right to privacy is, therefore, not hyperbole. If anything, the Government needs to revisit its position on traceability commitments of intermediaries and instead revise the IT Act, 2000 in line with existing global best practices besides legislating the long-pending Data Protection Bill.

Read the original post:
Ending encryption: On enforcing traceability on popular messaging apps - The Hindu

Read More..

E-mail Encryption Market is Anticipated to Gain Moderate CAGR by 2027 The Manomet Current – The Manomet Current

This E-mail Encryption market report also focuses on a few key projections that are necessary for a positive business future. New technologies are also presented in order to gain a total advantage over the competition. Numerous industry aspects, including sales methods, investments, and growth rate, are also statistically evaluated in the Market Report. It also focuses on making comparisons between a variety of geographical areas.

Get the complete sample, please click:https://www.globalmarketmonitor.com/request.php?type=1&rid=669952

It reflects on the changes that new and established companies must make in order to grow and adapt to consumer developments in the future. It also assists the reader in identifying key aspects of the global report and offers enough statistical data to comprehend its service. It also looks at potential flaws as well as issues that new and established businesses face. The E-mail Encryption market report provides the reader with all of the vital financial, economic, and social factors applicable to the industry, allowing them to make an informed decision.

Major enterprises in the global market of E-mail Encryption include:Proofpoint Trend Micro HP Data Motion Sophos Privato Cryptzone Symantec EdgeWave LuxSci

Market Segments by Application:Financial Services Energy Government Education Healthcare

Worldwide E-mail Encryption Market by Type:SMTP STARTTLS S/MIME PGP

Table of Content1 Report Overview1.1 Product Definition and Scope1.2 PEST (Political, Economic, Social and Technological) Analysis of E-mail Encryption Market2 Market Trends and Competitive Landscape3 Segmentation of E-mail Encryption Market by Types4 Segmentation of E-mail Encryption Market by End-Users5 Market Analysis by Major Regions6 Product Commodity of E-mail Encryption Market in Major Countries7 North America E-mail Encryption Landscape Analysis8 Europe E-mail Encryption Landscape Analysis9 Asia Pacific E-mail Encryption Landscape Analysis10 Latin America, Middle East & Africa E-mail Encryption Landscape Analysis 11 Major Players Profile

Ask for a Report Sample at:https://www.globalmarketmonitor.com/request.php?type=3&rid=669952

Furthermore, this study sheds light on a few key points that will drive the global markets financial flow. It also focuses on a number of key sources that can be used in the market to achieve the best results and gains. It also covers some critical approaches for exploring global market opportunities and expanding the company. In this E-mail Encryption market report, a thorough regional study is carried out, with a focus on a few main regions such as Europe, China, North America, Japan, India, and South America. Key players can easily gain a prominent position in the market with the aid of this detailed market research. It also depicts the COVID-19 global effects on various segments and countries.

In-depth E-mail Encryption Market Report: Intended AudienceE-mail Encryption manufacturersDownstream vendors and end-usersTraders, distributors, and resellers of E-mail EncryptionE-mail Encryption industry associations and research organizationsProduct managers, E-mail Encryption industry administrator, C-level executives of the industriesMarket Research and consulting firms

This E-mail Encryption Market report will help its clients to learn about gaps and growth in the market, investment opportunities, new methods of production, as well as how to target market with the aid of this Market Report. It includes information on marketing strategies, market demographics, and sales volume. Readers will get a few important insights about prospective customers and their needs in the user research part of this distinctive Market analysis. The purpose of a market research study is to give information on the market environment, consumers, rivals, and other industry elements. It conducts in-depth research into all sectors of the industry in order to provide information on geopolitical, social, scientific, economic, and societal trends that have a significant impact on any organization.

About Global Market MonitorGlobal Market Monitor is a professional modern consulting company, engaged in three major business categories such as market research services, business advisory, technology consulting.We always maintain the win-win spirit, reliable quality and the vision of keeping pace with The Times, to help enterprises achieve revenue growth, cost reduction, and efficiency improvement, and significantly avoid operational risks, to achieve lean growth. Global Market Monitor has provided professional market research, investment consulting, and competitive intelligence services to thousands of organizations, including start-ups, government agencies, banks, research institutes, industry associations, consulting firms, and investment firms.ContactGlobal Market MonitorOne Pierrepont Plaza, 300 Cadman Plaza W, Brooklyn,NY 11201, USAName: Rebecca HallPhone: + 1 (347) 467 7721Email: info@globalmarketmonitor.comWeb Site: https://www.globalmarketmonitor.com

Guess You May Interested In:Flange Safety Valves Market Reporthttps://www.globalmarketmonitor.com/reports/476362-flange-safety-valves-market-report.html

Fetal and Neonatal Care Equipment Market Reporthttps://www.globalmarketmonitor.com/reports/489867-fetal-and-neonatal-care-equipment-market-report.html

RIS Radiology Information System Market Reporthttps://www.globalmarketmonitor.com/reports/634136-ris-radiology-information-system-market-report.html

Mobile Payment (Mobile Money) Market Reporthttps://www.globalmarketmonitor.com/reports/687851-mobile-paymentmobile-moneymarket-report.html

Chlorfluazuron Market Reporthttps://www.globalmarketmonitor.com/reports/488066-chlorfluazuron-market-report.html

Optically Clear Adhesive Market Reporthttps://www.globalmarketmonitor.com/reports/613085-optically-clear-adhesive-market-report.html

View post:
E-mail Encryption Market is Anticipated to Gain Moderate CAGR by 2027 The Manomet Current - The Manomet Current

Read More..