Post Quantum Cryptography: Renewing the last line of defense
Cryptography is the last line of defense – and quantum computers will break that defense. Read what software company SAP will do to prevent this from happening.
Read moreCryptography is the last line of defense – and quantum computers will break that defense. Read what software company SAP will do to prevent this from happening.
Read moreIn the second episode of our editorial podcast on 5G security, we elaborate on the need of virtualization for 5G. On one hand, being software-based, virtualization makes 5G networks more vulnerable, while also vritualization opens up more possibilities for securing mobile networks.
Read moreRogue devices, which are intentionally compromised to carry out cyberattacks, become an increasingly popular mean among cybercriminals. Read what to do about them here.
Read moreIn the sixth episode of our OSINT series, Dr. Varin Khera explores the Dark Web – the hidden internet – using the TOR service. Do try this at home!
Read moreWhen selecting security solutions, it’s important to have a plan to follow Having an architecture will help you integrate the various solutions into a stronger overall defense.
Read moreInsecure devices from the home networks might infect the corporate infastructure when we return to the office. We’ve had the chance to talk to Matthias Canisius about what strategies are best to securely go back to work.
Read moreIn our first edition of a series, we’re giving an overview of 5G security and what it means for the future. Further in the series, we’re deep diving into the different topics of 5G security.
Join our editors Dr. Anand Prasad, Patrick Boch and Rajeev in understanding the full impact of 5G security.
Are you depicting a hacker as a lone nerd with a hoodie sitting in his basement? Nothing could be further from the truth. Read how cybercrime is organized today:
Read moreSocial Engineering is still the most effective approach for hackers to get access. Stephen Gailey about how to identify and detect this attack method.
Read moreWhen it comes to security assessments, there are often misunderstandings between consultant and customer. This article covers both perspectives, giving a unique insight for both parties.
Read more