A Peek Into CISA’s Post-Quantum Cryptography Roadmap
August 30 2022To help organizations with their plans, NIST and the Department of Homeland Security developed the Post-Quantum Cryptography Roadmap.
Read moreTo help organizations with their plans, NIST and the Department of Homeland Security developed the Post-Quantum Cryptography Roadmap.
Read moreDocuments appear to show that Israeli spyware company Intellexa sold a full suite of services around a zero-day affecting both Android and iOS ecosystems.
Read moreDocuments appear to show that Israeli spyware company Intellexa sold a full suite of services around a zero-day affecting both Android and iOS ecosystems.
Read moreWhat does the recent LastPass breach mean for password managers? Just a bump in the road, or a reason to ditch them entirely?
Read moreLow/no-code tools allow citizen developers to design creative solutions to address immediate problems, but without sufficient training and oversight, the technology can make it easy to make security mistakes.
Read moreBusinesses need to re-evaluate their cyber-insurance policies as firms like Lloyd's of London continue to add restrictions, including excluding losses related to state-backed cyberattackers.
Read moreThe NSA has has published criteria for evaluating levels of assurance required for DoD microelectronics.
The introductory report in a DoD microelectronics series outlines the process for determining...
Read more
Documents allegedly belonging to an EU defense dealer include those relating to weapons used by Ukraine in its fight against Russia.
Read moreCISOs must adopt a new mindset to take on the moving targets in modern cybersecurity.
Read moreAfter one company suffered a breach that could have been headed off by the MFA it claimed to have, insurers are looking to confirm claimed cybersecurity measures.
Read more
Recent Comments