The long-expected Executive Order On Improving the Nation’s Cybersecurity was published Wednesday, May 12, 2021. My initial reaction is positive. It calls for using multifactor authentication and encryption within Federal agencies after all, things th… Continue reading A Cyber Executive Order For the 21st Century
Every effective PII protection effort addresses three critical imperatives – data discovery, access governance and risk mitigation. IT teams grappling with privacy mandates need to consider these factors across their unstructured and structured data c… Continue reading How to Protect Structured and Unstructured Data
I know RSA has the concept of "public" and "private" key and one key is used for "encryption" and another for "decryption", but I am confused if both keys can be used for both purposes.. I mean, what… Continue reading In RSA, can any of the two keys be used for both encryption and decryption?
Colonial Pipeline might be tight-lipped about the vulnerability hackers exploited to launch a ransomware attack that shut down the U.S.’s largest pipeline, but details are emerging about the DarkSide ransomware variant behind the attack and the cyberc… Continue reading DarkSide Offered Ransomware-as-a-Service Before Pipeline Attack
SecurID announced key enhancements that will help organizations accelerate their cloud journeys, provide full-spectrum authentication options, and ensure flexible and adaptive identity experiences for all users and use cases. Together, these innovation… Continue reading SecurID’s enhancements accelerate cloud adoption and advance customers’ zero trust strategies
One of the scariest phrases I have ever encountered is “gasoline pipeline” –thousands of miles of three foot diameter pipes buried in the ground for decades carrying billions of gallons of one of the most dangerous substances we encounter every day. R… Continue reading Of Pipelines And Cybersecurity
I have gone through many posts here but did not find the right solution. I want to decrypt a value encrypted in c# .net from Android.
I have successfully decrypted in .net platform using the following code snippet
public static void Main()… Continue reading Decrypt RSA encrypted value generated from .net in Android [migrated]
As COVID-19 unfolded in the first half of 2020, many of us set out to explore its long-term ramifications and imagine what the ‘new normal’ could look like. We also wanted to understand the second- or third-order effects of remote working and accelera… Continue reading Protecting Collaboration Channels for Remote Work
When the security industry talks about a data breach, often the first question asked involves the state of the victim’s network security – not the breach of data. Why is this? It’s because organizations have their security priorities… Continue reading The Security Industry is Protecting the Wrong Thing
In a recently released report sponsored by HP, Nation States, Cyberconflict and the Web of Profit, Dr. Mike McGuire, senior lecturer in criminology at the University of Surrey, claims a 100% rise in nation-state cyberincidents between 2017 and 2020. F… Continue reading Enterprises in the Crosshairs of Nation-State Attacks