Featured Resources
Decryption and Inspection and the Steps Needed for Privacy Compliance
This web conference provides an overview of the threat landscape and how attackers use encryption to their benefit and why the inspection of network traffic is necessary for privacy compliance.
Read More
How can homomorphic encryption address privacy in COVID-19 apps?
Husna Siddiqi and Dalia Khader explain how a cryptographic concept called “homomorphic encryption” may be able to help assuage privacy concerns around COVID-19 applications.
Read More
Encrypt your data to make GDPR and Russian Localization Law compatible
Oleg Blinov suggests encryption could be “a strategy that would be in formal compliance with Russian personal data law while maintaining a high level of protection of data subject’s rights and interests.”
Read More