The Critical Three-Phase Timeline PQC

The UK’s National Cyber Security Centre Presents Timeline and Roadmap for PQC Migration

The United Kingdom’s National Cyber Security Centre (NCSC) has just released updated guidance on migrating to post-quantum cryptography (PQC) to help the nation prepare for developing threats posed by advances in quantum ...

Understanding Quantum Threats and How to Secure Data with Post-Quantum Cryptography

Post-Quantum Cryptography (PQC) is a new generation of encryption algorithms for protecting data against powerful quantum computers. Quantum computers use quantum mechanics to solve complex problems much faster than traditional computers. With ...
PKI-Based Passkeys

PKI-Based Passkeys Lead The Way For A Passwordless Future

Recently, on World Password Day (May 2nd), tech giant Google revealed that Google Passkeys are being used by more than 400 million user accounts worldwide, authenticating users more than 1 billion times ...
A graphic illustration of how PKI works

Your Guide to How PKI Works & Secures Your Organization

Public key infrastructure secures everything from the login credentials in your browser to the sensitive data you share via email — here’s how PKI works. The post Your Guide to How PKI ...
Detecting GnuTLS CVE-2020-13777 using Zeek

Detecting GnuTLS CVE-2020-13777 using Zeek

By Johanna Amann, Software Engineer, Corelight CVE-2020-13777 is a high severity issue in GnuTLS. In a nutshell, GnuTLS versions between 3.6.4 (released 2018-09-24) and 3.6.14 (2020-06-03) have a serious bug in their ...
5 Actionable Takeaways from Ponemon and KeyFactor’s 2020 PKI Study

5 Actionable Takeaways from Ponemon and KeyFactor’s 2020 PKI Study

Looking for the latest stats and info about public key infrastructure? Look no further 74%. That’s how many organizations report not knowing how many keys and certificates they have. This... The post ...