Good news ! Hackbusters community is waiting for you !
KnowBe4 has been running the HackBusters site for a few years now, providing you with trending IT security news. We are expanding it and have launched a new exciting online community! The forum is divided into four main topics or categories: Social Engineering, Ransomware, Phishing and Security Awareness Training. You are invited to be one of the first to join us at:

Applying Secure Multiparty Computation Technology


3rd Party Risk Management , Application Security , Blockchain & Cryptocurrency

Secure multiparty computation technology enables users to carry out computation on private data while it remains encrypted, says Israel-based Yehuda Lindell, a cryptography professor who's chief scientist at the security firm Unbound Tech. One of the main applications is for protecting cryptographic keys, he says in an interview with Information Security Media Group.

SMC offers a more practical option to the usual practice of storing keys in a hardware security module, which is difficult to manage, he contends.

Using SMC, he says, "we can split the secrets into random pieces and put them on different machines and then have the computations being carried out without everything being bought together ... without the key being remembered," he says.

This new technology can be installed by deploying virtual machines to set up the framework, Lindell explains.

In this interview (see audio...(continued)

View All Trending Stories