The first post-quantum encryption standards
The U.S. National Institute of Standards and Technology (NIST) has issued the first post-quantum encryption standards — FIPS 203, FIPS 204, and FIPS 205.
26 articles
The U.S. National Institute of Standards and Technology (NIST) has issued the first post-quantum encryption standards — FIPS 203, FIPS 204, and FIPS 205.
In late 2022, Apple announced a raft of new data protection features. Why does that matter to users?
To prevent Azure Storage and Amazon S3 cloud services from becoming malware distribution vectors, scan files while they’re uploading.
Having a shared storage and data exchange environment can pose additional risks to corporate security.
If your phone falls into the hands of criminals, do not panic. Here is how to protect your data.
Nowadays, building a dossier on any Internet user is easier than you might think. Learn about doxers and their methods.
We explore how encryption protects your data and why quantum computers might shake things up.
According to recent news, quantum supremacy is reached. What should we do about it?
Ex-employees can go to extremes for the sake of revenge. How to terminate a work relationship safely and securely.
58% of small and medium-size companies use various public-cloud-based business applications to work with customer data.
Implementing effective cybersecurity technologies does not equal GDPR compliance, but it is among the cornerstones on which this compliance is built.
How can we get prepared for the decryption capabilities of upcoming quantum computers?
There’s been a lot of talk lately about privacy protection and VPNs. But what exactly is a VPN? We explain in simple words.
CryptXXX ransomware encrypts files, steals data and bitcoins. Sounds serious, but we have a solution!
USA and Canada governments are fed up with the tyranny of ransomware. Experts from both countries analyzed the latest incidents and released an advisory for their citizens.
Devices that have functions of special importance, or that contain top-secret information, are not usually connected to the Internet. However, going offline is not the ultimate protection.
While LTE networks are seemingly just now starting to take off, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s perspectives. What are those next-gen networks going to be and why do we need them at all?
Hotels offer not just free WiFi but occasionally even free use of devices such as iPads these days. While it is really nice, a misconfigured device like this may store just a bit too much personal data, easily retrievable by the next visitor…
Losing your work or personal data is a computing worst case scenario. While there is no shortage of ways you can lose your data, there are also a number of protections that can help.
The story of Naoki Hiroshima and his single letter twitter handle underscores the importance of taking a holistic approach to Internet security and reiterates the reality that the security of