The dramatic rise in cybercrime and privacy concerns has led to increased demand for encryption technologies that protect sensitive data. Despite hefty security solution investments, organizations are still unable to safeguard information from unauthorized use. Given the growing volume and increasing severity of cyberattacks, security is now a top business priority that necessitates heavy investments in proactive and reactive security solutions.
Today’s key-based encryption methods have an inherent vulnerability which is a single point of failure. If a hacker is able to acquire the encryption key through brute force, side channel, or other type of attack, he will own access to all of the data protected by that key. Some solutions change encryption keys at hard coded time intervals, such as once an hour. During that hour, a hacker has more than enough time to intercept sensitive data and breach a network.
These are just some of the breaches that have occurred in the U.S. in the past few months:
August 2017 – Hackers Leak ‘Game Of Thrones’ Documents and HBO Emails
May 2017 – The medical information of 134,000 Tampa Bay Surgery Center patients is now available online.
May 2017 – A hacker stole the medical records of thousands of Bronx Lebanon Hospital Center patients in New York from 2014 to 2017.
April 2017 – The personal information of at least 500,000 Alliance Auto Lending Corp. customers is now available online.
February 2017 – A hacker now has the personal information of 4,800,000 job seekers who use or have used America's Joblink.
January 2017 – Arby's point-of-sale system (POS) was breached exposing 355,000 credit card and debit cards.