458 Results for:TLS

  • Sort by: 

Danish researcher explains zero-knowledge proofs and post-quantum encryption

By Pat Brans 26 Apr 2022

A graduate from the University of Aarhus, a Danish researcher is now a leading player in some of the most important issues in cyber security Read More

How to implement machine identity management for security

By Michael Cobb 12 Jul 2021

In IAM, companies must consider whether machines, applications and devices have the appropriate identities and access authorizations when communicating behind the scenes. Read More

OpenSSF GM talks funding, legal software supply chain issues

By Beth Pariseau 25 Jan 2023

The OpenSSF leader lays out plans fund open source software supply chain security in a slowing economy and to speak out against the EU's Cyber Resilience Act. Read More

New IBM encryption tools head off quantum computing threats

By Ed Scannell 04 Dec 2020

IBM rolled out a series of cloud-based services that improve hybrid cloud users' cryptographic key protection, in part to future-proof incursions by quantum computers. Read More

CyberUK 22: Data-sharing service to protect public from scams

By Alex Scroxton 11 May 2022

A new data-sharing service set up by the NCSC and industry partners will give ISPs access to real-time threat data that they can use to block fraudulent websites Read More

How to secure data at rest, in use and in motion

By Andrew Froehlich 28 Jul 2022

With internal and external cyber threats on the rise, check out these tips to best protect and secure data at rest, in use and in motion. Read More

Russia behind dangerous Cyclops Blink malware

By Alex Scroxton 24 Feb 2022

Joint NCSC CISA advisory attributes a dangerous malware, dubbed Cyclops Blink, to Russia’s Sandworm APT, likely a GRU unit, with WatchGuard users at particular risk Read More

10 types of security incidents and how to prevent them

By TechTarget Contributor, Alissa Irei 12 Jan 2024

Cyberattacks are more varied and numerous than ever. Learn the key signs of common security incidents and how to respond to keep systems and data safe. Read More

KubeCon 2020 preview: Session guide for Kubernetes professionals

By Meredith Courtemanche 27 Oct 2020

The virtual format of KubeCon 2020 means Kubernetes adopters can learn from their peers and take in expert presentations on Kubernetes and related technologies. Read More

Use a zero-trust model for container security in the cloud

By Kurt Marko 15 May 2020

Traditional firewalls just won't cut it when it comes to container security in the public cloud. Zero-trust models are a better approach, but they demand some careful upfront work. Read More