quantum computing, AI, DigiCert encryption,QKD quantum

Encryption Evolution is on the Horizon

Quantum computers are an emerging technology that will revolutionize several aspects of computational power across countless fields. One of the more concerning predictions is the likelihood that quantum computers will eventually break ...
Security Boulevard

AI-Generated Steganography

New research suggests that AIs can produce perfectly secure steganographic images: Abstract: Steganography is the practice of encoding secret information into innocuous content in such a manner that an adversarial third party ...
3 Ways Hackers Can Exploit Your Encrypted Tunnels

3 Ways Hackers Can Exploit Your Encrypted Tunnels

It wasn’t that long ago when the ‘crown jewels’ of Equifax, the sensitive data, were up for grabs by the hackers who “masked their incursions by using encrypted communications.” Leveraging encryption to ...

Strengthening Crypto Account Security: Beyond SMS 2FA

As Bitcoin Week kicks off in Miami today, we are reminded the rise of cryptocurrencies is revolutionizing the financial landscape and providing individuals with unprecedented control over their digital assets. However, this ...
Governments Try to Ban Encryption (Yet Again)

Governments Try to Ban Encryption (Yet Again)

Déjà vu: Yet again, they’re tugging on the “think of the children” strings. But you can’t make math illegal ...
Security Boulevard
open source security

Enterprise Organizations Must go Back to Cybersecurity Basics

With more than $170 billion spent on cybersecurity in 2022 (Gartner), enterprise organizations are still struggling to adequately protect their data. From the medical sector to the financial industry, education sector and ...
Security Boulevard
ransomware GAO cyberinsurance Sonrai

Show Me the Coverage: Ransomware Actors Demand Cyberinsurance Policies

The landscape of cybersecurity threats is continuously evolving, and ransomware attacks have emerged as a significant concern for organizations of all sizes. In a ransomware attack, cybercriminals encrypt the victim’s files, rendering ...
Security Boulevard
Understanding Hashing Algorithms: A Beginner's Guide

Understanding Hashing Algorithms: A Beginner’s Guide

Understanding the importance of hashing algorithms in securing your data, different types of hashing algorithms, and their unique features ...
Avoid The Hack: 4 Best Secure Cloud Storage Providers

Avoid The Hack: 4 Best Secure Cloud Storage Providers

| | Cloud, encryption
While convenient, many of the most well-known and popular cloud storage providers have direct access to your files - in some cases, third-parties may have access to your files as well. Encrypted ...

Security Analysis of Threema

A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users ...