encryption

Cleantech and Quantum Computing: Critical Infrastructure Cybersecurity
As cleantech becomes a bigger part of U.S. critical infrastructure, it faces a bigger risk from cyberattackers leveraging quantum attacks ...

Cisco Nexus 9000 Users Must Disable Encryption to Dodge Vuln
There is no workaround or patch for a high-severity vulnerability—and none will be forthcoming—in Cisco’s Nexus 9000 series switches ...

Encryption Evolution is on the Horizon
Quantum computers are an emerging technology that will revolutionize several aspects of computational power across countless fields. One of the more concerning predictions is the likelihood that quantum computers will eventually break ...
AI-Generated Steganography
New research suggests that AIs can produce perfectly secure steganographic images: Abstract: Steganography is the practice of encoding secret information into innocuous content in such a manner that an adversarial third party ...

3 Ways Hackers Can Exploit Your Encrypted Tunnels
It wasn’t that long ago when the ‘crown jewels’ of Equifax, the sensitive data, were up for grabs by the hackers who “masked their incursions by using encrypted communications.” Leveraging encryption to ...
Strengthening Crypto Account Security: Beyond SMS 2FA
As Bitcoin Week kicks off in Miami today, we are reminded the rise of cryptocurrencies is revolutionizing the financial landscape and providing individuals with unprecedented control over their digital assets. However, this ...

Governments Try to Ban Encryption (Yet Again)
Déjà vu: Yet again, they’re tugging on the “think of the children” strings. But you can’t make math illegal ...

Enterprise Organizations Must go Back to Cybersecurity Basics
With more than $170 billion spent on cybersecurity in 2022 (Gartner), enterprise organizations are still struggling to adequately protect their data. From the medical sector to the financial industry, education sector and ...

Show Me the Coverage: Ransomware Actors Demand Cyberinsurance Policies
The landscape of cybersecurity threats is continuously evolving, and ransomware attacks have emerged as a significant concern for organizations of all sizes. In a ransomware attack, cybercriminals encrypt the victim’s files, rendering ...

Understanding Hashing Algorithms: A Beginner’s Guide
Understanding the importance of hashing algorithms in securing your data, different types of hashing algorithms, and their unique features ...