RSA
Breaking RSA with a Quantum Computer
A group of Chinese researchers have just published a paper claiming that they can—although they have not yet done so—break 2048-bit RSA. This is something to take seriously. It might not be ...

SolarWinds Hackers Targeting Government Agencies Via Email
Threat actor Nobeliumm, the state-backed Russian group of cybercriminals behind last year’s SolarWinds hacking campaign, has launched a new attack targeting government agencies, think tanks, consultants and non-governmental organizations, according to Microsoft ...

Protecting the Hybrid Cloud With Zero-Trust
Cloud security is tough enough, but hybrid cloud adds a few extra challenges, such as visibility between cloud platforms and the difficulty of remaining current with compliance protocols for industry and government ...

The Establishment of a Cyber Safety Review Board
In 2013, the Obama Administration began asking what government could do to improve cybersecurity. By February 2014, Farnam Jahanian, Assistant Director for Computer and Information Science and Engineering at the National Science ...

A Cyber Executive Order For the 21st Century
The long-expected Executive Order On Improving the Nation’s Cybersecurity was published Wednesday, May 12, 2021. My initial reaction is positive. It calls for using multifactor authentication and encryption within Federal agencies after ...

How to Protect Structured and Unstructured Data
Every effective PII protection effort addresses three critical imperatives – data discovery, access governance and risk mitigation. IT teams grappling with privacy mandates need to consider these factors across their unstructured and ...

DarkSide Offered Ransomware-as-a-Service Before Pipeline Attack
Colonial Pipeline might be tight-lipped about the vulnerability hackers exploited to launch a ransomware attack that shut down the U.S.’s largest pipeline, but details are emerging about the DarkSide ransomware variant behind ...

Of Pipelines And Cybersecurity
One of the scariest phrases I have ever encountered is “gasoline pipeline” –thousands of miles of three foot diameter pipes buried in the ground for decades carrying billions of gallons of one ...

Protecting Collaboration Channels for Remote Work
As COVID-19 unfolded in the first half of 2020, many of us set out to explore its long-term ramifications and imagine what the ‘new normal’ could look like. We also wanted to ...

The Security Industry is Protecting the Wrong Thing
When the security industry talks about a data breach, often the first question asked involves the state of the victim’s network security – not the breach of data. Why is this? It’s ...