The first post-quantum encryption standards
The U.S. National Institute of Standards and Technology (NIST) has issued the first post-quantum encryption standards — FIPS 203, FIPS 204, and FIPS 205.
23 articles
The U.S. National Institute of Standards and Technology (NIST) has issued the first post-quantum encryption standards — FIPS 203, FIPS 204, and FIPS 205.
In late 2022, Apple announced a raft of new data protection features. Why does that matter to users?
To prevent Azure Storage and Amazon S3 cloud services from becoming malware distribution vectors, scan files while they’re uploading.
Having a shared storage and data exchange environment can pose additional risks to corporate security.
If your phone falls into the hands of criminals, do not panic. Here is how to protect your data.
Nowadays, building a dossier on any Internet user is easier than you might think. Learn about doxers and their methods.
We explore how encryption protects your data and why quantum computers might shake things up.
According to recent news, quantum supremacy is reached. What should we do about it?
Ex-employees can go to extremes for the sake of revenge. How to terminate a work relationship safely and securely.
How businesses globally handle personally identifiable information.
Implementing effective cybersecurity technologies does not equal GDPR compliance, but it is among the cornerstones on which this compliance is built.
How can we get prepared for the decryption capabilities of upcoming quantum computers?
CryptXXX ransomware encrypts files, steals data and bitcoins. Sounds serious, but we have a solution!
USA and Canada governments are fed up with the tyranny of ransomware. Experts from both countries analyzed the latest incidents and released an advisory for their citizens.
Any system that is connected to the Internet is always subject to threats, no matter how well it is protected. This assumption is well-known to any teenager today. No software
While LTE networks are seemingly just now starting to take off and are not yet omnipresent, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s
Losing your work or personal data is a computing worst case scenario. While there is no shortage of ways you can lose your data, there are also a number of protections that can help.
The story of Naoki Hiroshima and his single letter twitter handle underscores the importance of taking a holistic approach to Internet security and reiterates the reality that the security of
For most of us, our digital devices are incredibly important possessions. They hold our most important personal information like photos, passwords and account info, and travel with us on a
It can be very tempting to instantly share the most exciting moments of your vacation with relatives and maybe make your friends a little bit jealous. That’s why we usually