Indistinguishability Obfuscation

Quanta magazine recently published a breathless article on indistinguishability obfuscation — calling it the “‘crown jewel’ of cryptography” — and saying that it had finally been achieved, based on a recently published ...

Innovative Encryption Solutions to Help Prevent Side Channel Attacks

Encryption is an essential element of effective cybersecurity and data protection. Only systems or individuals with the correct encryption keys are able to decipher and view the encrypted data. Of course, attackers ...
Small, fast and easy. Pick any three.

Small, fast and easy. Pick any three.

By Seth Hall, Co-Founder & Chief Evangelist, Corelight Zeek has been the darling of security defenders looking to get deep visibility into network traffic. Over the last two decades, Zeek has become ...

3 Ways to Prepare Your Enterprise’s Data Security for a Future of Advanced Attacks

One significant negative implication of technology’s continual evolution is proportional advancement in nefarious internet activities, particularly cyber attacks. The past few years have seen a rising sophistication in cyber attacks at levels ...
ZTNA

Implementing ZTNA: 4 Reasons Why Mobile is a Good Place to Start

ZTNA is a good fit for today’s remote workforce, and mobile is a perfect landscape to implement a ZTNA strategy Sitting behind a desk in an office is quickly becoming a thing ...
Security Boulevard
Check, Please! Adding up the Costs of a Financial Data Breach

Check, Please! Adding up the Costs of a Financial Data Breach

Guest article by Andrea Babbs, UK General Manager at VIPREReliance on email as a fundamental function of business communication has been in place for some time. But as remote working has become ...
3 Alert Sources That Will Keep Your SOC Busy and Welcome Automation in 2021

3 Alert Sources That Will Keep Your SOC Busy and Welcome Automation in 2021

With the work-from-home shift showing little signs of letting up and new IT spending habits taking shape, organizations should prepare... The post 3 Alert Sources That Will Keep Your SOC Busy and ...
Linux

Why Linux Should Factor Into Your Security Strategy

Linux is a pervasive operating system—and for good reason. It’s lightweight, flexible, multi-architecture supportive and open source, all leading to loads of opportunity. Today, Linux-based systems run servers, mainframes, routers, smart cars, ...
Security Boulevard
Managing Your Security Product in the Cloud, Like a Spartan

Managing Your Security Product in the Cloud, Like a Spartan

The famous movie “300” tells the story of king Leonidas and his 300 Spartan warriors – who withstood a monumental attack by the Persian empire during the battle of Thermopylae, even though ...