Please turn on your JavaScript for this page to function normally.
numbers
Are your cryptographic keys truly safe? Root of Trust redefined for the cloud era

In the digital world, cryptographic solutions use encryption keys to secure data at rest, data in use, and data in transit. They are responsible for encrypting and decrypting …

cloud
Understanding the cloud shared responsibility model

Over the past year, we witnessed a transition to the cloud as companies had to quickly adjust to the almost instantaneous move to a remote work environment. But in many cases, …

Door
Quantum computing is imminent, and enterprises need crypto agility now

Nearly 100 years ago, the first quantum revolution ushered in the technological advances that have made our modern life possible. Advances in quantum physics led to the …

quantum
One step closer to quantum-secure conference calls

The world is one step closer to ultimately secure conference calls, thanks to a collaboration between Quantum Communications Hub researchers and their German colleagues, …

server
Quantum communications reaching record distances

The Cambridge Research Laboratory of Toshiba Europe announced a demonstration of quantum communications over optical fibres exceeding 600 km in length. The breakthrough will …

Broken glass
Most mobile finance apps vulnerable to data breaches

77% of financial apps have at least one serious vulnerability that could lead to a data breach, an Intertrust report reveals. This report comes at a time where finance mobile …

code
Keeping pace with evolving code signing baseline requirements

Maintaining code integrity has always been top of mind for today’s development-driven organizations. However, the recent SolarWinds breach was a stark reminder of the …

lock
Higher encryption adoption driven by rising data breach threats

Security and IT professionals in the Middle East are demonstrating a rising desire to secure critical applications and data, driving higher encryption adoption for newer use …

lock
Reimagining enterprise cryptography: How to regain control in a fragmented environment

Cryptography has been on a significant journey over the past two decades. Its role in securing the digital world of 20 years ago was very different to its role in the modern …

biohazard
Malware-related attacks jump by 54%

Extensive analysis of cyberthreats in 2020 reveals a 91% jump in attacks on industrial companies and a 54% rise in malware-related attacks compared to 2019. Medical …

endpoint protection
Endpoint complexities leaving sensitive data at risk

Absolute Software announced key findings from its report which shines a light on key trends affecting enterprise data and device security, and underscores the dangers of …

lock
Organizations have seen an increase in device encryption

32% of organizations have seen an increase in device encryption in the past year, according to a Vanson Bourne survey. Additionally, 31 percent noted that their organization …

Don't miss

Cybersecurity news