Despite hybrid working creating various opportunities and benefits for employees and employers alike, the hybrid working model raises questions on the vulnerability of data security.
Encryption is a form of scrambling data to ensure a piece of information can only be deciphered by the owner of that data.
Microsoft recommends potentially affected customers use a hardware security module (HSM) to prevent another piece of malware from stealing secrets from AD FS servers.
Digital fraud has never been more prevalent, potentially costing the world $10.5 trillion USD annually by 2025, a truly staggering sum.
Proper extended detection and response solution (XDR) with proper USB device control can help organisations make their IT systems more resistant to infection through USB interface.
With the revelation of espionage carried out by some governments using Pegasus software, it is clear that mobile devices have no privacy.
Today’s world is a digital world. A place of online meetings, virtual conferences, cloud-stored documents, and… digital signatures.
In one of the previous blogs and on a recent PQC webinar we have discussed the public-key cryptography’s vulnerability to quantum attacks, specifically to attacks relying on Shor’s algorithm.
In September 2020 Secura published an article disclosing a vulnerability in Windows Server (all known versions) Netlogon Remote Protocol. This vulnerability is known as CVE-2020-1472 or more commonly, Zerologon.
What is entropy and why do we need it in security and cryptographic systems?
Page 7 of 10