šØCISA & NSA release Crucial Guide on Network Segmentation and Encryption in Cloud EnvironmentsšØ In response to the evolving requirements of cloud security, the Cybersecurity & Infrastructure Security Agency (CISA) and the National Security Agency (NSA) recently released a comprehensive Cybersecurity Information Sheet (CSI): "Implement Network Segmentation and Encryption in Cloud Environments." This document provides detailed recommendations to enhance the security posture of organizations operating within cloud infrastructures (that probably means you). Key Takeaways Include: šĀ Network Encryption: The document underscores the importance of encrypting data in transit as a defense mechanism against unauthorized data access. šĀ Secure Client Connections: Establishing secure connections to cloud services is fundamental. šĀ Caution on Traffic Mirroring: While recognizing the benefits of traffic mirroring for network analysis and threat detection, the guidance cautions against potential misuse that could lead to data exfiltration and advises careful monitoring of this feature. š”ļøĀ Network Segmentation: Stressed as a foundational security principle, network segmentation is recommended to isolate and contain malicious activities, thereby reducing the impact of any breach. This collaboration between NSA and CISA provides actionable recommendations for organizations to strengthen their cloud security practices. The emphasis is on strategically implementing network segmentation and end-to-end encryption to secure cloud environments effectively. Information security leaders are encouraged to review this guidance to understand better the measures necessary to protect cloud-based assets. Implementing these recommendations will contribute to a more secure, resilient, and compliant cloud infrastructure. Access the complete guidance provided by the NSA and CISA to fully understand these recommendations and their application to your organizationās cloud security strategy. š Read CISA & NSA's complete guidance here: https://lnkd.in/eeVXqMSv #cloudcomputing #technology #informationsecurity #innovation #cybersecurity
Data Encryption Methods
Explore top LinkedIn content from expert professionals.
-
-
āļøCEPS (Centre for European Policy Studies) has just published the report "Strengthening the EU transition to a quantum-safe world" This 125-page publication offers a comprehensive and very timely analysis of the global transition toward quantum-safety, highlighting key recommendations and identifying the hurdles that we, as a community, still need to overcome. Accross its 10 general recommendations and 16 additional sector-specific ones, two key aspects take a prominent role: š Operational challenges of the transition, like establishing business-level priorities, building executive support, addressing the limited cryptographic talent issue, cryptographic homogeneization in products, and building cryptographic inventories based on priorities. š Coordination and the role for regulators, identifying that the EU lacks a coherent, unified transition framework, the need to ensure alignment and coherence across roadmaps and the risks of a fragmented transition. Key conclusions on the later, aligned with previous statements from the Europol Quantum Safe Financial Forum and FS-ISAC, is that quantum-safety is already part of the EU's operational resilience compliance through the āstate of the artā security principle embedded in GDPR, DORA, CRA and NIS2. However, there is a recognised need for further guidance that can be achieved through open collaboration between the public and private sector. Although the report focuses on the financial, public, and defence sectors, its main takeaways can easily be extended to other critical domainsātransport, energy, healthcare, and many more. The principles are the same, and the urgency is the same. This report is an important step forward, and my hope is that the ideas it lays out help shape the conversations and, more importantly, the actions we need across the EU. A well-aligned and coordinated transition is essential if we want the whole ecosystem to move toward a new age where we manage cryptography in a more mature, proactive, and resilient way. Kudos to CEPS, lorenzo pupillo, Carolina Polito, Swann A. and Afonso Ferreira, PhD for achieving this milestone. https://lnkd.in/dpWJ86q2
-
The CXOās guide to Quantum Security Customers often tell me that the migration to post-quantum cryptography (PQC) will take them years, and some assets wonāt ever be upgraded. While quantumās long-term threat is clear, security leaders are grappling with the practical, multiyear journey of upgrading potentially thousands of devices, applications and data stores to be quantum-resistant. The āharvest now, decrypt laterā threat raises the stakes. Nation-state actors are siphoning and stockpiling encrypted data today, waiting for the arrival of quantum computers to retroactively break it. The implication? Sensitive data may already be in the wrong hands and itās only a matter of time before it can be put to use. What CXOs need is a clear path forward: Discover - Complete a comprehensive crypto inventory across your environment. You cannot protect what you cannot see. Protect - Achieve post-quantum decryption at scale with NGFW that have crypto-agility built right in, enabling your security as standards evolve. Ā Accelerate - Leverage segmentation along with emerging new capabilities, like cipher translation, to instantly upgrade legacy devices and applications to secure your data now while your organization upgrades devices and applications. Ā Read moreĀ https://bit.ly/4nVkurw
-
The Future of PKI - What Comes After 2025? Public Key Infrastructure has long been the quiet backbone of digital trust - securing web traffic, devices, users, and more. But as the IT landscape transforms, so too must PKI. We're now entering a new phase where PKI is evolving from a compliance checkbox into a dynamic enabler of identity, automation, and resilience. Let me outline my personal view on what the road ahead might look like. Ā Radical certificate lifespan reduction What was once a 2-year certificate lifespan are shrinking to 90 days - and soon, we may see TLS certificates valid for just 47 days or even less. This change is a forcing function - manual management is no longer viable, and full automation becomes mandatory. Expect protocols like ACME to extend beyond web certs into internal infrastructure, IoT, and microservices. Ā Machine identity at massive scale The number of machines - VMs, containers, APIs, edge devices - far outpaces human users. Each needs a unique, verifiable identity. PKI will be critical in managing and securing these identities at scale, with dynamic issuance, real-time revocation, and full lifecycle automation. Ā Post-quantum cryptography becomes operational Quantum computers capable of breaking classical cryptography arenāt here yet - but the timeline is no longer theoretical. Organizations must begin cryptographic agility planning now. Expect hybrid certificates, crypto inventory tooling, and PQC-enabled PKI platforms to move from pilot to production over the next few years. Ā PKI as a security service layer We're seeing a shift in mindset: PKI is no longer just a backend CA. It's becoming a policy enforcement and trust orchestration layer for Zero Trust networks, CI/CD pipelines, code signing, document validation, and more. In this model, PKI doesnāt just issue certs - it enforces identity assurance policies at runtime. Ā Embedded PKI in cloud-native architecture Cloud-native PKI will be baked into service meshes, identity-aware proxies, and API gateways - tightly integrated into modern app infrastructure. Kubernetes-native cert issuance and management (via cert-manager, SPIFFE/SPIRE, etc.) will become the standard for secure workload identity. Ā Regulation and compliance will catch up As digital identity and trust become central to national and enterprise resilience, expect increasing regulation around cryptographic assurance, certificate transparency, and secure software development - all of which will hinge on trustworthy PKI. Ā Ā PKI is no longer just about websites and email encryption. It's becoming the digital DNA of everything that connects, communicates, and collaborates. The organizations that embrace this shift early - with agility, automation, and foresight - will be better positioned to lead in a trust-driven world. Ā What are your thoughts? Keyfactor Venafi, a CyberArk Company AppViewX GlobalSign Sectigo SecureW2 Entrust Moheit Walia Jonatan Bunne Tomas Gustavsson
-
Breakthrough for the #quantum internet: For the first timeĀ a major telco provider has successfully conducted entangled photon experiments - on its own infrastructure. ā”ļø 30 kilometers, 17 days, 99 per cent fidelity. Our teams at T-Labs have successfully transmitted entangled photons over a fiber-optic network.Ā Over a distance comparable to travelling from Berlin to Potsdam. The system automatically compensated for changing environmental conditions in the network. Ā Together with our partner Qunnect we have demonstrated thatĀ quantum entanglement works reliably. The goal: a quantum internet that supports applications beyond secure point-to-point networks. Therefore, it is necessary to distribute the types of entangled photons. The so-called qubits, that are used for #QuantumComputing, sensors or memory. Polarization qubits, like the ones used for this test, are highly compatible with many quantum devices. But: they are difficult to stabilize in fibers. Ā From the lab to the streets of Berlin: This success is a decisive step towards the quantum internet. š¬ It shows how existing telecommunications infrastructure can support the quantum technologies of tomorrow. This opens the door to new forms of communication. Ā Why does this matter for people and society? Ā šØļø Improved communications: The quantum internet promises faster and more efficient long-distance communications. š Maximum security: Entanglement can be used in quantum key distribution protocols. Enabling ultra-secure communication links for enterprises and government institutions š”Technological advancement: high-precision time synchronization for satellite networks and highly accurate sensing in industrial IoT environments will need entanglement. Ā Developing quantum technologies isnāt just a technical challenge. A #humancentered approach asks how these systems can be built to serve real needs and be part of everyday infrastructure. With 2025 designated as the International Year of Quantum Science and Technology, now is the time to move from research to readiness. Matheus Sena, Marc Geitz, Riccardo Pascotto, Dr. Oliver Holschke, Abdu Mudesir
-
Europe is finally asking the right question ā but itās still early in the game. The ā¬180M sovereign cloud initiative is not the destination. Itās table stakes. Digital sovereignty is not a hosting problem. Itās a control problem. And control does not live in infrastructure ā it lives in the layer above it. The real battleground is the trust and control layer: Who owns identity? -Who governs authentication and authorization? -Who controls cryptographic keys? -Who enforces policy across systems? -Who guarantees provenance, traceability, and continuity? That layer defines whether sovereignty is declared⦠or actually executed. This is where Europe has a unique strategic opportunity. Because European Business Wallets, Digital Product Passports, and Trusted AI are not just digital tools ā they are control primitives for a new economic architecture. They enable: ā Programmable trust ā Verifiable ecosystems ā Cross-border interoperability with embedded compliance In other words: they operationalize sovereignty at scale. But there is a non-negotiable constraint most strategies are still underestimating: If itās not quantum-resilient, itās not sovereign. Any identity or trust system built today on vulnerable cryptography has a built-in expiration date. So the mandate is clear: š Move from sovereign infrastructure to sovereign control š Design from day one for a post-quantum world š Treat identity and trust as core strategic infrastructure, not as features Because the future wonāt be defined by who owns the cloud. It will be defined by who controls the logic of trust across the entire digital stack.
-
OWASP GenAI Security Project Drop! š§š;šš„ The team released āAgent Name Service (ANS) for Secure AI Agent Discovery,ā and it proposes a DNS-inspired registry that gives every AI agent a cryptographically verifiable āpassport.ā By combining PKI-signed identities with a structured naming convention, ANS enables agents built on Googleās A2A, Anthropicās MCP, IBMās ACP, and future protocols to discover, trust, and interact with one another through a single, protocol-agnostic directory. The paper details the architecture, registration/renewal lifecycle, threat model, and governance challenges, positioning ANS as foundational infrastructure for a scalable and secure multi-agent ecosystem. šš²šæš² š¶š ššµš² š½š®š¶š» šš”š¦ šš¼š¹šš²š:Ā Fragmented AI agents, ad-hoc naming, and zero verification. Shadow agents, spoofed endpoints, and long integration cycles šš¼š? Through a universal, PKI-backed directory where every agent presents a verifiable identity, advertises its capabilities, and can be resolved in milliseconds. This reduces integration risk and boosting time-to-value for autonomous workflows. š§šµš² šš²š®šŗ šŗš®š»š®š“š²š± šš¼:  ⢠Formalize a DNS-style naming schema tied to semantic versioning  ⢠Allow embedded X.509 certificate issuance & renewal directly into the registry lifecycle  ⢠Add protocol adapters (A2A, MCP, ACP) so heterogeneous agents register and resolve the same way PKI trust chain + semantic names + adapter layer = a secure, interoperable agent ecosystem. Ken Huang, CISSP, Vineeth Sai Narajala, Idan Habler, PhD, Akram Sheriff Alejandro Saucedo, Apostol Vassilev, Chris Hughes, Hyrum Anderson, Steve Wilson, Scott Clinton, Vasilios Mavroudis, Josh C., Egor Pushkin John Sotiropoulos, Ron F. Del Rosario
-
š Data in Use --Protection Strategies ā ļø The Challenge When data is being processed in memory (RAM/CPU), itās usually decrypted, which makes it vulnerable to: š„ Insider threats š„ Malware/memory scraping š„ Cloud provider access ā Solutions for Data in Use 1. Homomorphic Encryption (HE) Data stays encrypted even during computation. Supports analytics, AI/ML, and calculations without exposing raw values. š„ Use case: A hospital can run statistics on encrypted patient data without seeing individual records. Downside: Very slow for large-scale real-time workloads (still improving). 2. Secure Enclaves / Trusted Execution Environments (TEEs) Hardware-based isolation ā a secure āenclaveā inside the CPU where data is decrypted and processed. Even the system admin or cloud provider cannot see inside. ⨠Examples: š„ Intel SGX š„ AMD SEV š„ AWS Nitro Enclaves ā lets you isolate EC2 instances for secure key management, medical data processing, payment transactions, etc. š„ Use case: A bank can run fraud detection models on sensitive financial data in the cloud without exposing it to AWS staff. 3. Confidential Computing Broader concept: combines TEEs, encrypted memory, and sometimes HE. Ensures that data remains protected throughout its lifecycle (rest, transit, use). ⨠Cloud examples: š„ AWS Nitro Enclaves š„ Azure Confidential Computing š„ Google Confidential VMs 4. Secure Multi-Party Computation (MPC) Multiple parties compute a function jointly without revealing their private inputs. Often used in cryptocurrency custody, federated learning, and zero-knowledge proofs. š„ Example: Banks collaboratively detect fraud patterns without sharing customer records. #learnwithswetha #encryption #datainuse #learning #dataprotection #privacy
-
The biggest threat to your data isnāt happening tomorrow. It happened yesterday. If you havenāt heard of HNDL (Harvest Now, Decrypt Later), your long-term data strategy has a massive blind spot. Here is the reality: State actors and cybercriminals are capturing your encrypted data today. They canāt read it yet, so theyāre storing it in massive data vaults, waiting for the "Qday"āthe moment quantum computers become powerful enough to break current encryption. If your data needs to stay private for 5, 10, or 20 years, itās already at risk. Whatās on the line? ā³Ā Intellectual Property (IP) and trade secrets. ā³Ā Government and identity data. ā³Ā Long-term financial records and contracts. ā³Ā Sensitive customer health data. How do we solve it? š ļø We cannot wait for quantum supremacy to react. The fix starts now: ā³Ā Inventory: Identify which data has a long shelf-life. ā³Ā Crypto-Agility: Move toward systems that can swap encryption methods without a total overhaul. ā³Ā Hybrid PQC: Implement Post-Quantum Cryptography alongside classical methods to ensure traffic captured today remains a mystery tomorrow. The transition to quantum-resistant security is a marathon, not a sprint. Are you tracking HNDL on your current risk register? Letās discuss in the comments. š P.S. If you want help mapping your exposure or building a PQC migration plan, drop me a message. ā»ļø Share this post if it speaks to you, and follow me for more. #QuantumSecurity #PQC
-
Happy to see my article has been published at ABP Live on "Beyond AI: Why Quantum-Safe #Cryptography Is a Business Imperative in 2025" The alarming rise in cyberattacksāboth in India and globallyāmakes one thing painfully clear: traditional encryption is no longer enough. In India alone, businesses stand to lose ā¹20,000 crore this year, while global cybercrime costs are projected to reach $13.82 trillion by 2028. Even worse? The impending quantum era threatens to render our current cryptographic systems obsolete. Technologies like RSA, which power everything from internal communications to critical external collaborations, are vulnerable to quantum-enabled decryption. So what must businesses do right now? Embrace Quantum-Safe Messaging: Opt for end-to-end encrypted platforms designed to withstand quantum attacks, especially for communications with clients, partners, and vendors. Follow Standards and Best Practices: NIST has already rolled out the first wave of Post-Quantum Cryptography (PQC) standardsālike ML-KEM for encryption and ML-DSA for digital signatures. Think Strategically, Not Just Tactically: Transitioning to PQC is more than a technical upgradeāitās a strategic initiative. Build governance, crypto-agility, and roadmap planning into your cybersecurity strategy. What the world is doing: - Europe aims to migrate to quantum-safe encryption by 2030, starting with risk assessments and awareness campaigns in 2026 - The UKās NCSC is urging organizations to begin full migration planning by 2028 and complete it by 2035 - Setting an example in the private sector, it has integrated post-quantum encryption into its WireGuard and Lightway protocols using NISTās ML-KEM algorithm Reports from Indiaās BFSI sector show a worrying lack of readinessāyet almost 58% of CISOs recognize the threat within the next three years Key takeaway: Quantum-safe cryptography isnāt a futuristic conceptāitās a present-day necessity. The threat of "store now, decrypt later" attacks means the data we transmit today may be vulnerable tomorrow. Waiting isnāt an option Whether youāre in BFSI, government, telecoms, or healthcare, the time to act is now. Letās lead the shift toward a secure quantum future. #QuantumSafe #Cybersecurity #PostQuantumCryptography #CryptoAgility #DigitalTrust #QuantumReady #QNulabs QNu Labs
Explore categories
- Hospitality & Tourism
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Healthcare
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Career
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development