datasecurity

What is Confidential Computing? Everything you need to know

Confidential computing is a practice in which encrypted data stored in memory to restrict access for the security of the data in use. Confidential computing uses hardware-based techniques to detach data, individual... Read more »
Double Key Encryption

Microsoft announced public preview of Double Key Encryption

Microsoft introduced Double Key Encryption preview for data generated with Microsoft 365 applications using two keys to access secure information, Read more »
Encochat

EU law-enforcement team cracked encryption and shutdowns EncroChat

EncroChat is now hacked by police and arrested the whole gang.EncroChat is one of the largest encoded messaging providers. Read more »
IBM

IBM Releases Fully Homomorphic Encryption Toolkit

IBM ‘s Fully Homomorphic Encryption (generally abbreviated as FHE) toolkit is to enable developers to utilize in their solutions. By enabling computation directly on the encrypted data, according to IBM. The toolkit can have... Read more »
zoom end-to-end encryption

Zoom acquired Keybase with plan to provide End-to-End Encryption

Video conferencing has been one of the ways for conducting meetings earlier, but now the times have changed. As the COVID 19 lockdown has pushed people into staying indoors and people have... Read more »
Encryption

Encryption – Definition, Keys, Algorithms & More

What exactly is the encryption? In Cryptography, Encryption is the process of transforming/encoding data using some algorithm in such a way that only authorized users can decode and access it. Encryption protects... Read more »