Cyber Defense Magazine Special Annual Edition for RSA Conference 2021
Cyber Defense Magazine Special Annual Edition for RSA Conference 2021 - the INFOSEC community's largest, most popular cybersecurity event in the world. Hosted every year in beautiful and sunny San Francisco, California, USA. This year, post COVID-19, virtually with #RESILIENCE! In addition, we're in our 9th year of the prestigious Global InfoSec Awards. This is a must read source for all things infosec.
Cyber Defense Magazine Special Annual Edition for RSA Conference 2021 - the INFOSEC community's largest, most popular cybersecurity event in the world. Hosted every year in beautiful and sunny San Francisco, California, USA. This year, post COVID-19, virtually with #RESILIENCE! In addition, we're in our 9th year of the prestigious Global InfoSec Awards. This is a must read source for all things infosec.
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Evitoken Technology A New Way to<br />
Keep Secrets and Pass Them On<br />
By Fabrice Crasnier, director of Research & Development department of<br />
FREEMINDTRONIC<br />
Controlling the confidentiality of in<strong>for</strong>mation is now an absolute necessity, as there are so many cyber<br />
malicious acts. We can cite among others acts such as phishing, stalking or ransomware. These socalled<br />
"cyber" threats alone represent approximately 75% of the infiltration techniques giving access to<br />
your confidential or personal data. All of these techniques have the same approach, which is identity<br />
theft. This mechanism allows an individual, or a machine, to impersonate someone or something else.<br />
The recipient thus deceived, lifts his natural mistrust to trust this ill-intentioned sender.<br />
Protection techniques <strong>for</strong> transmitting confidential or personal data have been around <strong>for</strong> a very long<br />
time, as have signature mechanisms. They are most often based on asymmetric key algorithms, with<br />
strong encryption (<strong>RSA</strong> of 2048 or 4096 bits or even ECDSA). Un<strong>for</strong>tunately, if the model on which these<br />
encryption techniques are based is proven and ensures flawless security, its IT implementation is, <strong>for</strong> its<br />
95