Strong, even forced policies need to be in place to keep accidents to a bare minimum. Keeping track of standards, like Advanced Encryption Standard (AES), having flexible environments ready to switch between ciphers is a good practice, regardless of what sort of encryption you're going to use. Most of the encryption algorithms we use right now require too much computing power to crack, but that will change with quantum computing - hence, the Infosecurity community’s hype about quantum-resistant encryption. As generic as it sounds, following best practices and keeping up to date is the most important aspect of keeping ourselves safe.
Trave Harmon, Chief Executive Officer, Triton Computer Corporation Quantum-Resistant EncryptionĮncryption is not a thing that should be taken for granted and considered future proof. Therefore if a hacker penetrates your network, it doesn't matter because the data is useless if taken off net. With data loss protection, the data is encrypted at rest by default and even when transmitted the data is encrypted. You can restore data quickly through any means of backup and negate a ransom where infestation, but once they have your data there is only one thing you can do. Ransomware is evolving and advancing and they are no longer just holding your data hostage but actually releasing the data to the public causing secondary issues such as compliance, regulation violation and public embarrassment. Most people do not enable it and that is where the problem is. Abdul Rehman, Cyber-Sec Editor, VPNRanks Data Loss Protectionĭata loss protection (DLP) has advanced much in the last 10 years and is now pretty commonplace for most endpoint protection services. One thing is for sure: AI, blockchain, and IoT will be playing huge roles in the encryption advancements in the near future. This can prove to be a game changer for cybersecurity models like VPNs, firewalls and enterprise level security solutions because the fake data would be indistinguishable from the real data and thus would ensure its safety. Honey Encryption basically cons the hacker into thinking that they have successfully stolen the data whereas the data they stole is fake. The encryption technology that I'm looking forward to in 2020 the most is the Honey Encryption method.