encryption
DigiCert Survey Reveals Post-Quantum Cybersecurity Challenges
Michael Vizard | | Data Security, DigiCert, encryption, post-quantum computing, PQC, quantum computing
A DigiCert survey found most organizations unprepared to address the security implications of post-quantum computing (PQC) ...
Security Boulevard
SIM Swapping Attacks Hit High-Profile Targets
Cybercriminals crave breaching the networks of large organizations. These large corporations hold vast amounts of sensitive information and often protect these assets with enterprise-grade security. Although breaking into these systems isn’t easy, ...
Enhance Cloud Security With a Cloud Access Security Broker (CASB)
Mosopefoluwa Amao | | CASB, Cloud Access Security Broker (CASB), Cloud Security, cloud services, Cybersecurity, encryption, security policies
Cloud access security brokers (CASBs) provide a robust framework for improving cloud security ...
Security Boulevard
Enhancing Cyberdefense for Your Business: Where to Begin
Arani Adhikari | | cyber defense, Cybersecurity, Data breach, encryption, Organization, security assessment
SMEs must seek cyberdefense guidance from cybersecurity professionals with the necessary expertise ...
Security Boulevard
Fortifying the Foundation: Empowering a Zero-Trust Security Paradigm
Zero-trust has become a significant trend as organizations adapt to a world where perimeter security no longer offers sufficient protection ...
Security Boulevard
Google Eyes Quantum with New Security Key Implementation
Google is taking steps this month to help the cybersecurity field stay ahead of the looming security threat that is coming with the ongoing development of quantum computing. The IT giant this ...
Security Boulevard
You Can’t Rush Post-Quantum-Computing Cryptography Standards
Bruce Schneier | | cryptography, encryption, national security policy, NIST, quantum computing, security standards, Uncategorized
I just read an article complaining that NIST is taking too long in finalizing its post-quantum-computing cryptography standards. This process has been going on since 2016, and since that time there has ...
Backdoor in TETRA Police Radios
Bruce Schneier | | backdoors, cryptography, eavesdropping, encryption, Infrastructure, law enforcement, police, Radio, Uncategorized
Seems that there is a deliberate backdoor in the twenty-year-old TErrestrial Trunked RAdio (TETRA) standard used by police forces around the world. The European Telecommunications Standards Institute (ETSI), an organization that standardizes ...
Cleantech and Quantum Computing: Critical Infrastructure Cybersecurity
As cleantech becomes a bigger part of U.S. critical infrastructure, it faces a bigger risk from cyberattackers leveraging quantum attacks ...
Security Boulevard
Cisco Nexus 9000 Users Must Disable Encryption to Dodge Vuln
There is no workaround or patch for a high-severity vulnerability—and none will be forthcoming—in Cisco’s Nexus 9000 series switches ...
Security Boulevard