2025: The Year of Browser Bugs - Vivek Ramachandran

SquareX at BSidesSF and RSAC 2025 Conference

Bringing Browser Security to the ForefrontWhat a week it’s been! The SquareX team just returned from San Francisco where we attended two back-to-back cybersecurity events: BSides SF and RSAC 2025 Conference. These ...

RSAC 2025 Sets A Dangerous Precedent for Cybersecurity Leadership

| | Commentary, Cybersecurity, rsa
(I posted this on LI, but I like to own my content, so am also posting here.) The cybersecurity community deserves better than what we’re witnessing at RSAC 2025, today. While Kristi ...

From SSL to TLS 1.3: 30 Years of Encryption and Innovation

Thirty years ago, the Internet was a wild, lawless territory—unregulated, unpredictable, and far from secure. Trust on the web was fragile, and encryption was more of a luxury than a necessity. But ...
AVX ONE Code Signing GitHub Integration

AppViewX AVX ONE Code Signing Integration with GitHub

The AppViewX AVX ONE Code Signing solution works with GitHub to enable the implementation of code signing policies for PowerShell script files. With this integration, DevOps teams can enhance security by automating ...

Key Post-Quantum Cryptography Insights from the Executive Order On Strengthening And Promoting Innovation in the Nation’s Cybersecurity

Ever since the U.S. National Institute of Standards and Technology (NIST) set 2030 as the deadline for retiring legacy encryption algorithms like RSA and ECDSA, the PKI industry is abuzz with activity ...

Machine Identity Was the Focus at Gartner’s IAM Summit

Last week’s Gartner IAM Summit in Grapevine, Texas, was a whirlwind of insights, particularly around machine identity management (MIM). The event underscored the transformative trends and challenges shaping the domain, providing both ...

Key Takeaways from the Latest NIST Guidance on Transitioning to Post-Quantum Cryptography

NIST recently released an Initial Public Draft (IPD) report on transitioning from traditional public-key cryptographic algorithms to standardized post-quantum cryptography (PQC). This report details NIST’s roadmap for the PQC adoption, including timelines ...

What You Need to Know About “Harvest-Now, Decrypt-Later” Attacks

As quantum computing leapfrogs at great speed, the spotlight is now on post-quantum cryptography (PQC). Recently, NIST released the first three PQC encryption algorithm standards, urging organizations to test the new algorithms ...

Understanding Quantum Threats and How to Secure Data with Post-Quantum Cryptography

Post-Quantum Cryptography (PQC) is a new generation of encryption algorithms for protecting data against powerful quantum computers. Quantum computers use quantum mechanics to solve complex problems much faster than traditional computers. With ...
Wireshark SSLKEYLOGFILE

How to Inspect TLS Encrypted Traffic

Do you want to analyze decrypted TLS traffic in Wireshark or let an IDS, like Suricata, Snort or Zeek, inspect the application layer data of potentially malicious TLS encrypted traffic? There are ...