article thumbnail

Securing Internet Videoconferencing Apps: Zoom and Others

Schneier on Security

It still has a bit to go on end-to-end encryption. Zoom does offer end-to-end encryption if 1) everyone is using a Zoom app, and not logging in to the meeting using a webpage, and 2) the meeting is not being recorded in the cloud. That's pretty good, but the real worry is where the encryption keys are generated and stored.

Internet 279
article thumbnail

Zoom's Commitment to User Security Depends on Whether you Pay It or Not

Schneier on Security

And now we have this : Corporate clients will get access to Zoom's end-to-end encryption service now being developed, but Yuan said free users won't enjoy that level of privacy, which makes it impossible for third parties to decipher communications. And note that Stamos said "encrypted" and not "end-to-end encrypted."

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Three Keys to Modernizing Data Security: DSPM, AI, and Encryption

Thales Cloud Protection & Licensing

Three Keys to Modernizing Data Security: DSPM, AI, and Encryption andrew.gertz@t Tue, 01/21/2025 - 14:56 Discover how DSPM, AI, and encryption are transforming data security strategies, reducing vulnerabilities, and improving compliance. A DSPM moves the needle with integrated capabilities and comprehensive encryption.

article thumbnail

Webinar: Learn How to Stop Encrypted Attacks Before They Cost You Millions

The Hacker News

Encryption, designed to keep our online lives secure, is now being weaponized by cybercriminals to hide malware, steal data, and avoid detection.The result? surge in encrypted attacks over the past year and some of the most shocking ransom payouts in history, including a $75 million ransom in 2024.

article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

article thumbnail

The Cloud Trust Paradox: Keeping Control of Data & Encryption Keys in the Cloud

Thales Cloud Protection & Licensing

The Cloud Trust Paradox: Keeping Control of Data & Encryption Keys in the Cloud. With customers increasingly being less trusting of how companies store and process their data in the cloud, encrypting this data and controlling the encryption keys is essential for building trust. Thu, 03/04/2021 - 09:38.

article thumbnail

The Cyber Security Buffs: January 2021 Edition

Security Boulevard

Cyber Security Buffs conducted a webinar on 28th January 2021 to celebrate the occasion of Data Privacy Day. This webinar speculated the upcoming challenges and trends associated with data privacy. In this interactive session, esteemed […].