Devs are constantly challenged to stay ahead of the game particularly when it comes to protecting security. What’s your prediction for the next big idea in encryption tech we asked our panelists?
The eleven best answers are below:
Hardware-based disk encryption will continue to grow and bypass whole disk encryption software products. With this type of encryption, after a key has been delivered, the entire contents of a volume encrypts it after it is used. This doesn’t protect against network attacks via emails or sites, but it does protect data when a laptop or device is lost or stolen and a key is required to decrypt it. – Blair Thomas, eMerchantBroker
2. Homomorphic Encryption
Right now we encrypt data as it travels over the internet and when it is at rest on a storage device. However we have to decrypt data to use or analyze it, creating a potential security vulnerability. Homomorphic encryption is a new idea that solves that problem, allowing users to process data without decrypting it. With homomorphic encryption, we process encrypted data and produce encrypted results. – Vik Patel,
3. Moving Target Defense
The biggest problem we face with data security is not whether or not data is encrypted, it’s if we use the same code as the attackers. The next big idea in security is moving target defense. The idea is simple enough: constantly change the attack surface so the bad guys can’t spend time reverse engineering the environment. A crafted attack only works when you know what you’re attacking. – Andrew Vest, Redapt
4. Wearable Two-factor Authentication
Passwords are indeed important however so is the ease of use and functionality. Large cryptographically generated passwords are more powerful than typical use-and-remember passwords. Having wearable devices that will connect and convey this type of information can be very powerful and eliminate the challenges of multiple passwords. – Nicole Munoz
5. Physical-based Security
Encryption will be changing a lot in the future. It may be blockchain-based, quantum-computer-based, or something else altogether. We will likely see a resurgence of keeping private or personal info off of our computers completely. This is happening today with the use of hardware wallets for cryptocurrencies, and this trend will grow with the volatility of new encryption technologies. – Alexander Mistakidis, Gamelynx
6. Quantum Cryptography
This is the only proven method for transmitting a secret key or password over a distance. It functions by using photons of light to physically move a shared file between two parties. These photons might be intercepted by another technology, however they can’t be cloned or copied. – Michael Hsu, DeepSky
7. Smart contracts for encrypted payments
It’s not a matter of if, but when blockchain technology will become the standard for secure, encrypted transactions. Have you ever sent money through Western Union? It’s the equivalent of talking to a stranger in a 12-seat passenger van, except that you’re the one giving them the candy. Super sketchy. Unreliable. Risky. Cryptocurrency will quickly usurp Western Union and other mediums like it. – Sara Rose Harcus, Hüify
8. Honey encryption
Honey encryption is another level of security that helps deter potential data thieves. The way it works is by letting the hackers think they guessed correctly by making it look like the info provided is accurate, but it isn’t. – Chris Christoff,
9. Voice Biometrics & Facial Recognition
Enhanced voice biometric authentication and facial recognition are going to become important parts of securely identifying people when they want to access sensitive info. Asking for mother’s maiden name or pin code is no longer sufficient. – Samuel Thimothy, OneIMS
Blockchain technology, the same technology used to secure cryptocurrencies such as bitcoin has the potential to become a staunch ally against cyber threats. Blockchain technology, when applied to cybersecurity models, turns on all the lights, increases target fungibility and makes it virtually impossible to fake identification. – Robert J Choi, RJC & Company
11. Tokenization
Tokenization is the principle of substituting an actual piece of data for pseudo data with a ‘token.’ The founding principle of data security is that if you do not want your data stolen, don’t give it out to anyone. With tokenization tech we could see a world without payment fraud as merchants are no longer storing consumer payment data. – Zohar Steinberg