919 Results for:RSA

  • Sort by: 

Handbook helps Dutch organisations migrate to quantum-safe communication

21 Jul 2023

Organisations must start implementing new cryptography standards – as migration is a lengthy process Read More

Prepare for quantum to fundamentally change PKI effectiveness

19 Jul 2023

Encryption has always been a fundamental aspect of Public Key Infrastructure but the rise of quantum computing poses a significant threat to this. Thales' John Cullen says post-quantum cryptography may hold the key... Read More

Create an SSH key with GitHub for network access

By Stuart Burns 20 Jan 2022

SSH keys are a network security method that verifies the identity of the user or application seeking access to a system or other application. Create and store yours in GitHub. Read More

Risk & Repeat: Ransomware in 2022 so far

By Alexander Culafi 15 Jul 2022

This podcast episode discusses ransomware in 2022, including an apparent decrease in attacks, the evolution of cybercrime operations and the lack of visibility into the threat. Read More

8 data protection challenges and how to prevent them

By Kathleen Richards 17 Apr 2024

Businesses contend with a combination of issues spawned by data overload, privacy regulations, access rights, cyberattacks, cloud environments, generative AI and human error. Read More

How Target built its DevSecOps culture using psychology

By Alissa Irei 27 Apr 2023

Building a healthy DevSecOps culture isn't easy. Learn how Target used organizational psychology to get development and application security teams on the same page. Read More

The Security Interviews: Talking identity with Microsoft’s Joy Chik

By Alex Scroxton 14 Dec 2023

Microsoft’s president of identity and network access, Joy Chik, joins Computer Weekly to discuss the evolving threat landscape in identity security, using innovations in artificial intelligence to stay ahead, and ... Read More

Okta debuts passkey support to combat account compromises

By Arielle Waldman 04 Oct 2023

The identity and access management vendor introduced products and features that addressed new social engineering techniques that require additional security measures beyond MFA. Read More

RSA 2012: IT security experts urge enterprises to ban smartphone BYOD schemes

By Warwick Ashford 01 Mar 2012

Enterprises should ban employees from using their own smartphones for work, a panel of IT security practitioners told the RSA Conference 2012 Read More

Dutch influence standards for post-quantum cryptography

13 Oct 2022

Cryptology group at Dutch research institute is involved in the two primary algorithms of the next NIST portfolio comprising four new standards Read More