Estonia’s digital identity success offers South Africa clear lessons on trust, governance and inclusive design.
Despite growing awareness, a new study from Entrust reveals organizations continue to risk data breaches and service outages due to unmanaged keys and certificates, and use of outdated cryptography.
For C-suite leaders, one of the most daunting operational challenges of the next decade will be the migration to post-quantum cryptography: algorithms that can defend against attacks from quantum ...
The US Cybersecurity and Infrastructure Security Agency (CISA) has published an initial list of hardware and software product categories that support or are expected to support post-quantum ...
In the digital world, where information flows freely and cyber threats loom large, the security of sensitive data hinges on robust cryptographic measures. Specifically, the cryptographic key is a ...
For two decades, organizations have unknowingly accumulated a massive, silent liability on their balance sheets: cryptographic technical debt. Unlike infrastructure debt—servers needing upgrades or ...
The U.S. Department of War (DoW) has announced plans to transition to post-quantum cryptography (PQC) to safeguard its systems against the risks posed by quantum computing. A new memorandum outlines ...
The pro-Russia hacktivist group CyberVolk launched a ransomware-as-a-service (RaaS) called VolkLocker that suffered from serious implementation flaws, allowing victims to potentially decrypt files for ...
Gigamon, a leader in deep observability, is releasing GigaVUE 6.12, introducing new support for post-quantum cryptography (PQC) and further expanding the capabilities of the Gigamon Deep Observability ...
Cybersecurity and quantum technology solutions company SandboxAQ today announced the launch of OpenCryptography.com, a public database that maps cryptographic assets, vulnerabilities and risks across ...
In today's digital world, where security breaches can expose millions of records in seconds, and quantum computing is quickly moving from theory to reality, traditional cryptographic systems are under ...