919 Results for:RSA
- Sort by:
Handbook helps Dutch organisations migrate to quantum-safe communication
21 Jul 2023Organisations must start implementing new cryptography standards – as migration is a lengthy process Read More
Prepare for quantum to fundamentally change PKI effectiveness
19 Jul 2023Encryption has always been a fundamental aspect of Public Key Infrastructure but the rise of quantum computing poses a significant threat to this. Thales' John Cullen says post-quantum cryptography may hold the key... Read More
Create an SSH key with GitHub for network access
20 Jan 2022SSH keys are a network security method that verifies the identity of the user or application seeking access to a system or other application. Create and store yours in GitHub. Read More
Risk & Repeat: Ransomware in 2022 so far
15 Jul 2022This podcast episode discusses ransomware in 2022, including an apparent decrease in attacks, the evolution of cybercrime operations and the lack of visibility into the threat. Read More
8 data protection challenges and how to prevent them
17 Apr 2024Businesses contend with a combination of issues spawned by data overload, privacy regulations, access rights, cyberattacks, cloud environments, generative AI and human error. Read More
How Target built its DevSecOps culture using psychology
27 Apr 2023Building a healthy DevSecOps culture isn't easy. Learn how Target used organizational psychology to get development and application security teams on the same page. Read More
The Security Interviews: Talking identity with Microsoft’s Joy Chik
14 Dec 2023Microsoft’s president of identity and network access, Joy Chik, joins Computer Weekly to discuss the evolving threat landscape in identity security, using innovations in artificial intelligence to stay ahead, and ... Read More
Okta debuts passkey support to combat account compromises
04 Oct 2023The identity and access management vendor introduced products and features that addressed new social engineering techniques that require additional security measures beyond MFA. Read More
RSA 2012: IT security experts urge enterprises to ban smartphone BYOD schemes
01 Mar 2012Enterprises should ban employees from using their own smartphones for work, a panel of IT security practitioners told the RSA Conference 2012 Read More
Dutch influence standards for post-quantum cryptography
13 Oct 2022Cryptology group at Dutch research institute is involved in the two primary algorithms of the next NIST portfolio comprising four new standards Read More