Date | Title | Description |
21.10.2024 | Gartner: 2025 will see the rise of AI agents (and other top trends) | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
The pace of AI continues to accelerate, with capabilities never before thought possible now becoming a reality. T... |
16.10.2024 | The Quantum Countdown: Preparing for a Post-Quantum Future | The digital world is on the brink of a seismic shift. Quantum computing is no longer a distant dream; it’s a looming reality. Experts predict that within the next decade, quantum computers will break through the defenses of current encrypti... |
15.10.2024 | Generative AI in Security: Risks and Mitigation Strategies | Generative AI became tech’s fiercest buzzword seemingly overnight with the release of ChatGPT. Two years later, Microsoft is using OpenAI foundation models and fielding questions from customers about how AI changes the security landscape.
S... |
11.10.2024 | Implementing post-quantum cryptography (PQC) in modern systems | Most experts predict a quantum computer capable of breaking RSA and ECC encryption will be developed within the next decade. Virtually all of today’s security systems utilize RSA and ECC algorithms, which means the window to defend against ... |
08.10.2024 | Technology Leadership in the Boardroom: Driving Trust and Value | Each year, NACD leverages the perspectives and experience of its members and appoints a Blue Ribbon Commission, an experienced collective of directors, investors, subject-matter experts, and leading governance professionals. The Commission ... |
27.09.2024 | Communications Devices Inc. Achieves FIPS 140-3 Validation Setting A New Standard for Secure Communication | Communications Devices Inc. has been awarded FIPS 140-3 validation Cert #4795 by NIST for its PA100 secure out of band management product set. NEW JERSEY, NY, UNITED STATES, September 27, 2024 /EINPresswire.com/ -- Communications Devices In... |
24.09.2024 | With 23andMe in crisis, strengthening DNA security has never been more urgent | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
With all seven independent directors resigning from 23andMe last week, the company has become a cautionary tale o... |
17.09.2024 | STMicroelectronics delivers industry’s first FIPS 140-3 certified TPMs for computer, server, and embedded systems | Industry’s first FIPS 140-3 certified TPMs from ST
State-of-the-art protection certified to latest standard for information security certification, globally recognized and mandatory for US federal procurement
STMicroelectronics (NYSE:STM)
G... |
03.09.2024 | TuxCare Completes FIPS 140-3 Certification for AlmaLinux 9.2 Kernel | TuxCare PALO ALTO, CALIF., USA, September 3, 2024 /EINPresswire.com/ -- TuxCare, a global innovator in enterprise-grade cybersecurity for Linux, today announced it received a CMVP-validated certificate for the AlmaLinux 9.2 kernel and is no... |
02.09.2024 | Время, деньги и чистая математика: как мы оцениваем киберустойчивость компании | Всем привет! Я живу за городом, и у меня есть своя лужайка с газоном, за которой нужно ухаживать, периодически косить. Это занимает несколько часов. В выходные хочется провести больше времени с семьей и на лужайку сил не остается. Поэтому я... |
30.08.2024 | Navigating the Zero Trust Landscape: Beyond the Boundaries of Security | In the ever-evolving world of cybersecurity, the term "zero trust" has emerged as a beacon of hope. It promises a new way to secure networks, especially as traditional boundaries dissolve. But like a mirage in the desert, zero tru... |
30.08.2024 | Bridging the Gaps in Cybersecurity: The Zero Trust and Third-Party Script Dilemma | In the ever-evolving landscape of cybersecurity, two significant threats loom large: the limitations of Zero Trust Network Access (ZTNA) and the rising danger of third-party browser script attacks. Both present unique challenges, yet they s... |
30.08.2024 | Bridging the Zero Trust Gap: Beyond Access Control | In the ever-evolving landscape of cybersecurity, the concept of Zero Trust has emerged as a beacon of hope. It's a philosophy that says, "Never trust, always verify." But as organizations rush to adopt Zero Trust Network Access (Z... |
30.08.2024 | Bridging the Performance Gap: Custom Windows Builds and the Zero Trust Challenge | In the ever-evolving landscape of technology, performance and security are two sides of the same coin. Users crave speed, while organizations demand security. Custom Windows builds and the zero trust framework are two solutions addressing t... |
28.08.2024 | The critical gap in zero trust [Q&A] | As network boundaries can no longer be relied on to define the limits of cybersecurity, zero trust has become the overarching framework that now guides enterprise security strategies.
However, Zero Trust Network Access (ZTNA) has its limita... |
21.08.2024 | NIST Releases Second Public Draft of Digital Identity Guidelines for Final Review | Credit: N. Hanacek, B. Hayes/NIST
GAITHERSBURG, Md. — When we need to show proof of identity, we might reach for our driver’s license — or perhaps, sooner than many of us imagine, we may opt for a digital credential stored on a smartphone. ... |
16.08.2024 | Security Experts Welcome NIST’s New Encryption Standards For Quantum Computers | The U.S. National Institute of Standards and Technology this week unveiled three encryption algorithms designed to resist cyberattacks, which industry observers said are a positive step toward preventing cyberattacks that break current encr... |
15.08.2024 | NIST's Quantum Leap: New Standards for Post-Quantum Cryptography | On August 13, 2024, the National Institute of Standards and Technology (NIST) unveiled a trio of groundbreaking standards aimed at fortifying digital security against the looming threat of quantum computing. This announcement marks a pivota... |
14.08.2024 | Национальный институт стандартов и технологий США (NIST) стандартизировал три алгоритма постквантового шифрования... | 13 августа 2024 года Национальный институт стандартов и технологий США (NIST) представил первые три стандарта, определяющие криптоалгоритмы, стойкие к подбору на квантовых компьютерах.
По информации OpneNET, первый стандартизированный алгор... |
14.08.2024 | Terra Quantum’s TQ42 Library aligns with newly released NIST post-quantum cryptography standards | TQ42 Cryptography is the most comprehensive open-source PQC library available that fully aligns with the NIST PQC standards officially published yesterday
TQ42 Cryptography provides an accessible entry point for organizations to integrate q... |
14.08.2024 | DigiCert announces lineup for World Quantum Readiness Day | DigiCert has revealed the speaker lineup and award categories for the inaugural World Quantum Readiness Day. The virtual event is set to take place on the 26th of September, and it aims to provide strategies to organisations aiming to safeg... |
13.08.2024 | NIST Releases First 3 Finalized Post-Quantum Encryption Standards | Credit: J. Wang/NIST and Shutterstock
GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has finalized its principal set of encryption algorithms designed to withstand cyberattacks fr... |
26.07.2024 | Department of Commerce Announces New Guidance, Tools 270 Days Following President Biden’s Executive Order on AI | Credit: NicoElNino/Shutterstock
The U.S. Department of Commerce announced today, on the 270-day mark since President Biden’s Executive Order (EO) on the Safe, Secure and Trustworthy Development of AI, the release of new guidance and softwar... |
17.06.2024 | How Anthropic’s comprehensive red team methods close AI security gaps | It's time to celebrate the incredible women leading the way in AI! Nominate your inspiring leaders for VentureBeat’s Women in AI Awards today before June 18. Learn More
AI red teaming is proving effective in discovering security gaps that o... |
10.06.2024 | NIST Launches Collaborative Research Effort on Digital Identity to Support Secure Delivery of Public Benefits | Credit: N. Hanacek, B. Hayes/NIST
GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has launched a collaborative project to adapt NIST’s digital identity guidelines to support public... |
07.06.2024 | Snowflake’s customer breaches make 2024 the year of the identity siege | VB Transform 2024 returns this July! Over 400 enterprise leaders will gather in San Francisco from July 9-11 to dive into the advancement of GenAI strategies and engaging in thought-provoking discussions within the community. Find out how y... |
03.06.2024 | NIST NICE – модель компетенций в области ИБ | Давайте продолжим ход мысли недавней публикации про модели зрелости в области кибербезопасности. Допустим, провели мы оценку уровня своей защищенности по SAMM, CSF или другой модели, выбрали лучи-вектора для улучшения и целевые уровни. Отве... |
31.05.2024 | Data center security and spending skyrocket amid AI boom | USA News Group – With the artificial intelligence (AI) revolution fully underway, the importance and security of the data centers that power the new technology is surging. The role and preservation of these data centers is generating multip... |
14.05.2024 | NIST Finalizes Updated Guidelines for Protecting Sensitive Information | Credit: Shutterstock/ACTS DATA STOCK
Contractors and other organizations that do business with the federal government now have clearer, more straightforward guidance for protecting the sensitive data they handle.
The National Institute of S... |
07.05.2024 | Confronting quantum computers' cryptanalysis concerns | The race to successfully build quantum computers is on. With the potential to solve all manner of problems for humanity, players across the globe -- from tech companies to academic institutions to governments -- have been busy investing sig... |
03.05.2024 | Безопасность веб-приложений для самых маленьких фронтов | С первого взгляда кажется, что безопасность - это тема devops-а или бэкенда. Но разделить зоны ответственности в этом вопросе очень сложно. В этой статье я хотел бы поговорить о моментах, связанных именно с фронтендом - т.е. об атаках, кото... |
30.04.2024 | Qmulos Enhances Q-Compliance Platform, Adds Support for CMMC Level 3 Requirements, NERP CIP, OSCAL Interoperability, NIST 800-53 Rev. 5 Migration Capabilities, and Creates Technical Add-Ons for OpenSh... | Cutting-edge compliance, security, and risk management automation provider updates its platform with new features to help security teams comply with the latest compliance industry standards and help them make evidence-based decisions confid... |
29.04.2024 | Department of Commerce Announces New Actions to Implement President Biden’s Executive Order on AI | The U.S. Department of Commerce announced today, following the 180-day mark since President Biden’s Executive Order (EO) on the Safe, Secure and Trustworthy Development of AI, several new announcements related to the EO. The department’s Na... |
29.04.2024 | Forrester’s top 5 cybersecurity threats for 2024: Weaponized AI is the new normal | Discover how companies are responsibly integrating AI in production. This invite-only event in SF will explore the intersection of technology and business. Find out how you can attend here.
Weaponizing AI is proving to be a potent catalyst ... |
23.04.2024 | Fortanix launches Key Insight for enhanced multicloud cryptographic visibility and compliance
Your vote of support is important to us and it helps us keep the content FREE.
One click below supports ou... | Intel Corp.-backed multicloud security firm Fortanix Inc. today announced the general availability of Key Insight, a capability that enables enterprises to discover, assess and remediate risk and compliance gaps across hybrid multicloud env... |
02.04.2024 | Defending against IoT ransomware attacks in a zero-trust world | Join us in Atlanta on April 10th and explore the landscape of security workforce. We will explore the vision, benefits, and use cases of AI for security teams. Request an invite here.
IoT sensors and the smart devices they’re connected to a... |
19.03.2024 | February 2024 NICE Community Coordinating Council Monthly Meeting Recap | #ICYMI - Monthly Meeting Recap
Credit: NICE
In case you missed it, the minutes from the February 27, 2024, NICE Community Coordinating Council meeting have been published. The meeting included speakers from the U.S. Department of Education,... |
19.03.2024 | Microsoft is deprecating 1024-bit RSA certificate support in Windows 10 and Windows 11 to boost security | Microsoft has quietly announced plans to deprecate TLS server authentication certificates using RSA keys with key lengths shorter than 2048 bits.
The change means that it will not be possible to use 1024-bit keys, although Microsoft is yet ... |
27.02.2024 | Biden administration issues new cyber road map | The Commerce Department's National Institute of Standards and Technology (NIST) debuted a highly anticipated revamp of its cybersecurity framework Monday.
Why it matters: The agency framework has long provided a baseline for federal cyberse... |
26.02.2024 | Censinet Announces Benchmarking Study Results, New Product Innovations, and Cybersecurity Awards at ViVE 2024 Conference | 2024 Benchmarking Study Highlights Industry Cyber Maturity; New Product Releases Enable Enterprise-Wide Risk Orchestration, Eliminate Security Questionnaires
Censinet is excited to lead discussions at ViVE this year on the 2024 Benchmarking... |
20.02.2024 | Curing MedTech’s Cybersecurity Contagion | The U.S. National Cybersecurity Strategy, announced in March 2023, was joined by several other regulatory and legislative initiatives throughout the year that will have a major impact on the security of the Internet of Medical Things (IoMT)... |
29.01.2024 | 10 reasons why securing software supply chains needs to start with containers | Containers and Kubernetes are table stakes for multi-cloud app development, and they’re also among the least protected of any areas of software supply chains. Kubernetes commands 92% of the container orchestration platform market, despite D... |
29.01.2024 | Таинственные EASM и где они обитают. Часть 1. Кто ты? | Полный текст исследования опубликован здесь.
В современном мире практически любая организация имеет собственный ресурс в Интернете, который может предоставлять клиентам различные возможности. Сам ресурс может представлять из себя небольшой ... |
24.01.2024 | Угроза появления квантового компьютера для современной криптографии и шифрования | Введение
В последние десятилетия мы можем свидетельствовать о стремительном развитии технологий, приводящем к революционным изменениям в области вычислений. Одним из наиболее перспективных направлений становится исследование квантовых компь... |
10.01.2024 | Юристы продолжают пользоваться MD5 только из-за своего консерватизма | Недавно я узнала один загадочный факт: Международный уголовный суд хэширует электронные доказательства при помощи MD5.
Что в этом плохого? MD5 ужасно поломан. Настолько поломан, что специалисты уже больше десятка лет говорят, что никто не д... |
21.12.2023 | Первый квантово-устойчивый блокчейн на отечественых постквантовых алгоритмах: зачем это нужно и как работает... | Квантовые вычисления начали активно развиваться еще в 1970-х, но до конца прошлого века представляли лишь научный интерес. А в 1994 году математик Питер Шор представил алгоритм факторизации целых чисел и дискретного логарифмирования в конеч... |
18.12.2023 | Unleashing Chaos: The Anatomy of DDoS Attacks and Their Weaponization | Mayur Nagarsheth, Tech Times 18 December 2023, 03:12 am
1. Introduction and Definitions
We live in a world where digitization, automation, and connectivity have become the heart of every organization, business, infrastructure, state, and co... |
07.12.2023 | Cisco goes all in on AI to strengthen its cybersecurity strategy | Are you ready to bring more awareness to your brand? Consider becoming a sponsor for The AI Impact Tour. Learn more about the opportunities here.
Configuration complexity and rules are among organizations’ most lethal, accidental risks when... |
26.10.2023 | Surviving a ransomware attack begins by acknowledging it’s inevitable | VentureBeat presents: AI Unleashed - An exclusive executive event for enterprise data leaders. Network and learn with industry peers. Learn More
The best defense against a ransomware attack is assuming it will happen before it does. With an... |
23.10.2023 | Mitigating The Quantum Threat Today | David Williams, Arqit Founder, Chairman and CEO. |
12.10.2023 | Understanding The Roles Of IAL2 And FIDO In A Passwordless World | Michael Engle is CoFounder at 1Kosmos and was previously head of InfoSec at Lehman Brothers and CoFounder of Bastille Networks. |
03.10.2023 | How AI-powered patch management protects remote and hybrid workers | VentureBeat presents: AI Unleashed - An exclusive executive event for enterprise data leaders. Network and learn with industry peers. Learn More
Most organizations have no idea how many exposed, out-of-date endpoints they have or whether th... |
18.09.2023 | Why CISOs need zero trust as a ransomware shield | VentureBeat presents: AI Unleashed - An exclusive executive event for enterprise data leaders. Network and learn with industry peers. Learn More
This year is on pace to be the second-costliest for ransomware attacks ever, with threat actors... |
12.09.2023 | There’s No Single Solution To Quantum-Proof Security | Security CEO and founder of Safe Quantum Inc., working with data-driven companies to define, develop and deploy quantum-safe technologies. |
31.08.2023 | X's new privacy policy allows it to collect users' biometric data | X's new privacy policy allows it to collect users' biometric data
X's new privacy policy allows it to collect users' biometric data 01:36
Starting next month, X's updated privacy policy will entitle it to collect some users' biometric data ... |
25.08.2023 | Weaponized Generative AI: Combatting This Rising Threat To Security | Nitin Chopra is a Managing Director at Neotribe Ventures. |
24.08.2023 | Three Ways To Manage Security Risks In Cloud-Native Applications | CEO and cofounder of Ermetic, a provider of public cloud security technology. |
22.08.2023 | How AI brings greater accuracy, speed, and scale to microsegmentation | VentureBeat presents: AI Unleashed - An exclusive executive event for enterprise data leaders. Network and learn with industry peers. Learn More
Microsegmentation is table stakes for CISOs looking to gain the speed, scale and time-to-market... |
16.08.2023 | Gartner: Generative AI Will Bring “Transformational Benefit” in the Next 2-5 Years | Image: Smart Future/Adobe Stock
Generative AI has landed on Gartner’s coveted Hype Cycle for Emerging Technologies for 2023, the firm announced Wednesday. The firm said generative AI will bring “transformational benefit” in the next two to ... |
10.08.2023 | AI Is Coming For Your Data: 6 Steps To Ensure Cyber Resilience | Skip Sanzeri is the founder, board chair and COO of QuSecure, a top post-quantum cybersecurity company. |
04.08.2023 | Misconfigured Security Controls Threaten The Security Of Your Business | Oren is CPO and Co-Founder of Veriti, a consolidated security platform that maximizes the value of existing security stacks. |
27.07.2023 | Business continuity management: как выстроить его в своей компании за 10 шагов | Как наладить управление непрерывностью бизнеса
Механизмы BCM помогают планировать действия на случай внезапных происшествий, например, если случится утечка данных или просто процессы встанут на полдня из-за отключения электричества.
Вот с... |
20.07.2023 | Designing for safety: 10 cybersecurity priorities for a zero-trust data center | Head over to our on-demand library to view sessions from VB Transform 2023. Register Here
This article is part of a VB special issue. Read the full series here: The future of the data center: Handling greater and greater demands.
Zero trust... |
18.07.2023 | Cigent Announces New Pre-Boot Authentication (PBA) Full Drive Encryption That Meets Rigorous Government Security Standards for Data-at-Rest Protection | Cigent
FORT MYERS, Fla. (PRWEB) July 18, 2023
Cigent® Technology, Inc., the leader in embedded cybersecurity in storage devices, today unveiled Cigent Data Defense Pre-Boot Authentication, which Enables a TCG Opal 2.0 Self Encrypting Drive ... |
13.07.2023 | Here's what data you can expect to give up by joining Threads | A phone is seen running the Instagram Threads app by Meta in this photo illustration. Jaap Arriens/NurPhoto via Getty Images
Redeem now
Threads is Meta's new app, a text-based social media platform connected to Instagram.
Threads collects v... |
11.07.2023 | How To Address Cyber Threats Facing Uncrewed Military Vehicles | Tim Reed is the CEO of Lynx Software Technologies, the premier Mission Critical Edge software company. |
10.07.2023 | How ARPA-H can master the subtle art of risk-taking | Despite remarkable progress in health and medicine, biology’s final frontiers remain beyond our reach. Humanity has not yet cured Alzheimer’s or ended cancer, and was unable to prevent Covid-19 from growing into a pandemic.
As physicians an... |
06.07.2023 | Beyond Compliance: Why A Proactive Security Approach Is Imperative | Purandar Das, CEO and cofounder of Sotero. |
30.06.2023 | Why healthcare in the cloud must move to zero trust cybersecurity | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Healthcare providers must look beyond the cloud and adopt zero-trust security to succeed in fighti... |
30.06.2023 | Change Management: The Foundation For Migrating To Passwordless Security | Michael Engle is CoFounder at 1Kosmos and was previously head of InfoSec at Lehman Brothers and CoFounder of Bastille Networks. |
15.06.2023 | Proposed NIST Updates and Data Incident Response Planning | There are several ways in which an organization may discover that it has been the victim of a cyberattack or that an unauthorized third party has gained a foothold within its information technology (IT) environment. Perhaps most commonly, a... |
15.06.2023 | MIT-based AI apps startup aims to block supply chain attacks with advanced cybersecurity | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
The digital pandemic of increasing breaches and ransomware attacks is hitting supply chains and th... |
08.06.2023 | Адреса в Ethereum | Адрес аккаунта с самым большим количеством Ether
Данная статья будет посвящена адресам в сети Ethereum. Адрес неразрывно связан с такими понятиями, как приватный и публичный ключ, хэш-функция, аккаунт. В статье я продемонстрирую эту связь, ... |
07.06.2023 | Облака и безопасность | В наше время облачные сервисы неотъемлемо вовлечены во многие аспекты бизнеса и повседневной жизни. Вместе с удобством и гибкостью, которые они дают, приходит и увеличение рисков в области информационной безопасности. Утечки данных, киберат... |
24.05.2023 | Криптография для Интернета вещей | Исторические справки
В любой технологии, основанной на обмене данных, безопасность является важнейшим свойством, где криптографии отведена ключевая роль. Давайте посмотрим, в каком направлении шло развитие этой области ранее, и попробуем за... |
22.05.2023 | New Cooperative Cybersecurity Models Needed In An Era Of Global Risk | Project Manager Uses Digital Tablet Talks with Computer Scientist Looks at Big Screen Display ... [+] Showing Infographics Global World Map Data. Telecommunications Control Control Room with People Workinggetty |
02.05.2023 | Can Better Training Reduce the Success Rate of Phishing Attacks? | A review of Arun Vishwanath, “The Weakest Link: How to Diagnose, Detect, and Defend Users From Phishing Attacks” (MIT Press, 2022)
***
Many elements of the cyber threat landscape have changed significantly over the past two decades. For one... |
27.04.2023 | Apacer TCG Opal SSDs Have Earned FIPS 140-2 Certification | Apacer TCG Opal SSDs
Take Security to the Next Level with a Diverse Array of Extremely Secure SSDs FREMONT, CA, USA, April 27, 2023/EINPresswire.com/ -- As 5G rolls out worldwide and 6G remains under development, concerns persist about the ... |
13.04.2023 | Как взломать Kubernetes (и как его защитить) | Kubernetes — ценный ресурс и ведущая система управления контейнерами в конвейерах разработки по всему миру, но это не освобождает её от вредоносных атак. Использование Kubernetes требует глубокого понимания среды, включая разные уязвимости,... |
13.04.2023 | Managing machine identities in a zero-trust world | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Enterprises are struggling to manage the proliferating machine identities their organizations crea... |
12.04.2023 | Defending against backdoor attacks with zero trust | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Attackers are doubling down on backdoor attacks that deliver ransomware and malware, proving that ... |
11.04.2023 | The Buck Stops Here: Why The National Cybersecurity Strategy Is Our Biggest Opportunity Yet To Thwart Threat Actors | Pieter Danhieux is the cofounder and Chairman/CEO of Secure Code Warrior. |
31.03.2023 | The Next Wave In Zero Trust | As Chief Availability Officer (CAO), Lou Senko leads Q2’s hosting, security and compliance teams to deliver an enhanced customer experience. |
30.03.2023 | Tetrate, NIST, Department of Commerce to host 4th Annual Multi-Cloud Conference and Workshop | These are valuable lessons that any organization can benefit from, so we extend an open invitation to our global community. Anyone who wants to learn more about how to achieve high assurance security for cloud-native applications should joi... |
21.03.2023 | A roadmap to zero-trust maturity: 6 key insights from Forrester | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Once an enterprise decides to go all-in on zero trust, it usually starts strong, only to hit barri... |
20.03.2023 | Defining endpoint security in a zero-trust world | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Attackers strike at businesses with identity theft as their top goal. CISOs and CIOs told VentureB... |
15.03.2023 | For credentials, these are the new Seven Commandments for zero trust | Image: weerapat1003/Adobe Stock
Credential security company Beyond Identity has launched the Zero Trust Authentication initiative for organizations to hack-proof user credentials, with backing from major firms.
Zero trust is a framework tha... |
09.03.2023 | Семейство алгоритмов Ascon — новый стандарт легковесной криптографии | Режим работы шифра Ascon, см. список условных обозначений на схеме
В феврале 2023 года Национальный институт стандартов и технологий (NIST) выбрал стандарт легковесной криптографии для RFID, датчиков, Интернета вещей и других устройств с ог... |
28.02.2023 | How threat intelligence helps SecOps prevent cyberevents before they happen | CISOs tell VentureBeat they’re looking to get more value from security operations (SecOps) by identifying threats rather than analyzing them after an event. Gartner’s direction is that “SecOps’ goal is to create proactive risk understanding... |
21.02.2023 | Why Security Culture Is Key To Cybersecurity Resilience | Perry Carpenter is Chief Evangelist for KnowBe4 Inc., provider of the popular Security Awareness Training & Simulated Phishing platform. |
20.02.2023 | New research suggests that privacy in the metaverse might be impossible | A new paper from the University of California Berkeley reveals that privacy may be impossible in the metaverse without innovative new safeguards to protect users.
Led by graduate researcher Vivek Nair, the recently released study was conduc... |
17.02.2023 | The Five Important Moments In History That Shaped The Modern Cybersecurity Landscape | Ben Ben-Aderet is the CEO and co-founder of GRSee Consulting where he helps businesses achieve their compliance and information security goals. |
07.02.2023 | Take Control Of User Identities | President of Univention North America, making sure you stay in control of your data, your company and your future. |
06.02.2023 | Getting results from your zero-trust initiatives in 2023 | Check out all the on-demand sessions from the Intelligent Security Summit here.
CISOs today find their agendas dominated by the need to reduce the complexity and costs of securing multicloud infrastructure while consolidating tech stacks to... |
27.01.2023 | 10 steps every business can take to avoid a cybersecurity breach | Check out all the on-demand sessions from the Intelligent Security Summit here.
Businesses that survive cyberattacks understand that breaches are inevitable. That’s a strong motivator to make cyber-resilience and business recovery a core pa... |
16.01.2023 | Перевод: Топ-5 лучших практик управления уязвимостями | Для уменьшения поверхности атаки требуется надежное решение по управлению уязвимостями, которое поможет бороться с самыми постоянными и разрушительными киберугрозами современности.
Будь вы ИТ-директор, ИТ-менеджер или инженер, вы наверняка ... |
13.01.2023 | Обзор специальных публикаций NIST по управлению киберинцидентами | В предыдущих публикациях мы сделали обзор самых интересных на наш взгляд специальных публикаций NIST по информационной безопасности. В данном посте мы рассмотрим два документа от NIST, которые посвящены выстраиванию процессов реагирования н... |
12.01.2023 | 3 Predictions For Divergent Quantum Tracks In 2023 | Security CEO and founder of Safe Quantum Inc., working with data-driven companies to define, develop and deploy quantum-safe technologies. |
10.01.2023 | IP Cores, Inc. Announces a New High-Performance SHA-3 IP Core | PALO ALTO, Calif. (PRWEB) January 10, 2023
IP Cores, Inc., (California, USA, http://www.ipcores.com) has announced a new member of SHA3 family of cryptographic hash IP cores.
“Keccak-based algorithms per new standards FIPS 202 (SHA3-224, SH... |
06.01.2023 | Who Are The Early Adopters Of New Quantum-Secure Cryptography? | Founder and CEO of PQShield, a British cybersecurity startup specializing in quantum-secure solutions. |