IT - Encryption

A Road to a Consistent Encryption Strategy
Security Boulevard, May 30th, 2021
Unlike the rest of the world, adoption of enterprise-wide encryption strategies has not grown in the Middle East, in fact it appears to have shrunk slightly

"This is despite the fact that a majority of organizations have experienced a data breach.

These are two the most hard-hitting results from our annual Entrust Middle East Encryption Trends Study which examines how and why enterprises deploy encryption. Conducted by the Ponemon Institute, the 2021 study features insights that help reveal the future of encryption use and the solutions organizations are leveraging to solve the difficulties of working across multiple cloud environments..."

Cryptography has been on a significant journey over the past two decades. Its role in securing the digital world of 20 years ago was very different to its role in the modern enterprise.

"Today, it is understood that attackers are everywhere, and we cannot rely on a strong perimeter to keep them out. This requires organizations to deploy zero-trust solutions, where security is preserved even when attackers manage to get into the network.

The challenge is compounded by new ways of working such as BYOD, remote working, and the spreading of IT infrastructure across data centers and clouds, all of which now needs to be managed remotely. In this modern environment, cryptography is needed everywhere. Unfortunately, the need to deploy cryptographic solutions enterprise-wide, at the pace needed by business, comes with many challenges..."

According to the 2020 Cost of a Data Breach Report by Ponemon Institute and IBM Security, data breaches are costing enterprises $3.86 million on average, and they're taking an average of 280 days to discover the problem

"Clearly, hackers can and already do easily identify and access both corporate and personal information when files are transmitted from device to device unless certain cybersecurity measures are put into place. End-to-end encryption is the easiest solution for protecting this data so it doesn't get into the wrong hands.

End-to-end encryption is the practice of encrypting data and information as it passes from device to device. The sending and receiving devices can see the original contents, but no other interceptors have the correct keys to decrypt the message. This approach to cybersecurity offers many benefits to companies and users that implement the protection, but there are still some drawbacks in areas like consumer-provider relationships. Read on to learn more about how end-to-end encryption works, as well as some of the pros and cons of end-to-end encryption security..."

Cloud Security: Why Being Intentional in Encryption Matters
Security Intelligence, June 2nd , 2021
Cloud security and web application security demand technology and practices that protect applications and data hosted remotely

"Good old-fashioned data encryption is chief among these. The reasons for encrypting cloud data, of course, are privacy, security and regulatory compliance - all standard for any successful enterprise. At the bottom of all this is the idea of being intentional about encryption, knowing the standards you need to meet and the specifics of your group's needs. Make sure you're seeing the whole picture with our guide..."

Security and IT professionals in the Middle East are demonstrating a rising desire to secure critical applications and data, driving higher encryption adoption for newer use cases like containers and IoT platforms, as well as for email and private cloud infrastructures

"This and other findings are highlighted in the Entrust study, a multinational survey by the Ponemon Institute. The study reports on the cybersecurity challenges organizations face today, and how and why organizations deploy encryption.

Encryption adoption for private cloud infrastructure is up

According to respondents from the region, the most important feature associated with encryption solutions is support for cloud and on-premises deployment. The adoption of encryption for private cloud infrastructure is up 8% over the past two years and Bring Your Own Key (BYOK) management support was cited an important feature of cloud encryption solutions by 42% (vs. 34% globally), making this the 4th straight year that this was above the global average..."

See all Archived IT - Encryption articles See all articles from this issue