In this entry, the second in our series on post-quantum cryptography, we delve into the history of quantum computing, its foundation in quantum mechanics, and the kind of complex problems quantum computers will be able to solve.
Distributed energy generation (DEG) is a term used to describe the shift from centralized energy generation, such as power companies, to a source — typically a renewable energy source — closer to the user.
In this article, we dive into API gateway functions and risks, the advantages of API gateways in hybrid and multi-cloud environments, and common API security risks and best practices.
VicOne’s annual cyberthreat landscape report gives an idea of the coming reality of cyberthreats to modern cars. A chief concern is the vulnerabilities that could spell new risks to the connected vehicle ecosystem.
Das Jahr 2024 dürfte neue Herausforderungen für die Cybersicherheit bereithalten. Im Zuge der fortschreitenden Digitalisierung von Wirtschaft und Politik werden Unternehmen zunehmend künstliche Intelligenz und Machine Learning, Cloud-und Web3-Technologien.
After the shutdown of its leak site in October, we look at how ransomware group Trigona operated during its period of activity and discuss how enterprises can fortify their defenses against similar threats.
Im Zuge der kontinuierlichen Weiterentwicklung und Ausweitung von Technologien erleben Unternehmen ein technologisches Paradoxon: Zunehmende Interkonnektivität bedeutet, dass Unternehmen gleichzeitig stärker verteilt arbeiten.
Kubernetes, also known as K8s, is a very complex open-source platform that requires detailed attention to security. Despite previous efforts to increase its security, Kubernetes remains insecure by default and requires different security tools to protect the cluster.
We examine the automotive data ecosystem and take a closer look at privacy and security concerns arising from how data is generated, consumed, and transmitted by connected vehicles.