Addressing the intersection of cyber and physical security threats

In this Help Net Security, Nicholas Jackson, Director of Cyber Operations at Bitdefender, discusses how technologies like AI, quantum computing, and IoT are reshaping cybersecurity. He shares his perspective on the new threats these advancements bring … Continue reading Addressing the intersection of cyber and physical security threats

Biden cyber executive order gets mostly plaudits, but its fate is uncertain

At least one key Republican told CyberScoop that he wasn’t happy about the last-minute nature of the EO.

The post Biden cyber executive order gets mostly plaudits, but its fate is uncertain appeared first on CyberScoop.

Continue reading Biden cyber executive order gets mostly plaudits, but its fate is uncertain

Second Biden cyber executive order directs agency action on fed security, AI, space

A draft obtained by CyberScoop would give the sitting president a short window to sign it before his exit.

The post Second Biden cyber executive order directs agency action on fed security, AI, space appeared first on CyberScoop.

Continue reading Second Biden cyber executive order directs agency action on fed security, AI, space

Making the most of cryptography, now and in the future

Enterprise cryptography faces risks beyond just the advent of quantum computers. For starters, there is no guarantee that the traditional algorithms have not been broken. Though we believe that it is “unlikely” they can be, the reality is that in a con… Continue reading Making the most of cryptography, now and in the future

2024 trends: Were they accurate?

The new year always kicks off with a flood of prediction articles; then, 12 months later, our newsfeed is filled with wrap-up articles. But we are often left to wonder if experts got it right in January about how the year would unfold. As we close out 2024, let’s take a moment to go back […]

The post 2024 trends: Were they accurate? appeared first on Security Intelligence.

Continue reading 2024 trends: Were they accurate?

Does it make sense to disallow SHA-224 and SHA-256 to defend against quantum computers?

From Australia’s Guidelines for Cryptography:

For most purposes, a hashing algorithm with an output size of 224 bits provides 112 bits of effective security strength, with larger output sizes providing more bits of effective security stre… Continue reading Does it make sense to disallow SHA-224 and SHA-256 to defend against quantum computers?

The shifting security landscape: 2025 predictions and challenges

As the borderless threat ecosystem poses new challenges for companies and governments worldwide, CISA’s 2025-2026 International Plan aims to address this problem. CISA’s plan calls for integrated cyber defense across borders, addressing the compl… Continue reading The shifting security landscape: 2025 predictions and challenges

Preparing for Q-day: The essential role of cloud migration in securing enterprise data

As the era of quantum computing draws closer, businesses face a new and unprecedented threat to data security: “Q-day.” This looming turning point—when quantum machines can break traditional encryption with ease—has the potential to upend c… Continue reading Preparing for Q-day: The essential role of cloud migration in securing enterprise data

8-Bit Computers Crunch Advanced Scientific Computations

Although largely relegated to retrocomputing enthusiasts and embedded systems or microcontrollers now, there was a time when there were no other computers available other than those with 8-bit processors. The …read more Continue reading 8-Bit Computers Crunch Advanced Scientific Computations

AI Kuru, cybersecurity and quantum computing

As we continue to delegate more infrastructure operations to artificial intelligence (AI), quantum computers are advancing towards Q-day (i.e., the day when quantum computers can break current encryption methods). This could compromise the security of … Continue reading AI Kuru, cybersecurity and quantum computing