Attackers abuse different supply-chain scenarios to indirectly compromise organizations and applications. We delve into how a software pipeline works, where attacks could come from, and how to improve security.
In this article, we confront contemporary cryptography with a (so far) hypothetical quantum computer to show how asymmetric algorithms may potentially be broken if quantum computing technology becomes viable. First, we take a step into some basic mathematical objects.
In this entry, the second in our series on post-quantum cryptography, we delve into the history of quantum computing, its foundation in quantum mechanics, and the kind of complex problems quantum computers will be able to solve.
Distributed energy generation (DEG) is a term used to describe the shift from centralized energy generation, such as power companies, to a source — typically a renewable energy source — closer to the user.
In this article, we dive into API gateway functions and risks, the advantages of API gateways in hybrid and multi-cloud environments, and common API security risks and best practices.
VicOne’s annual cyberthreat landscape report gives an idea of the coming reality of cyberthreats to modern cars. A chief concern is the vulnerabilities that could spell new risks to the connected vehicle ecosystem.
Das Jahr 2024 dürfte neue Herausforderungen für die Cybersicherheit bereithalten. Im Zuge der fortschreitenden Digitalisierung von Wirtschaft und Politik werden Unternehmen zunehmend künstliche Intelligenz und Machine Learning, Cloud-und Web3-Technologien.
After the shutdown of its leak site in October, we look at how ransomware group Trigona operated during its period of activity and discuss how enterprises can fortify their defenses against similar threats.
Im Zuge der kontinuierlichen Weiterentwicklung und Ausweitung von Technologien erleben Unternehmen ein technologisches Paradoxon: Zunehmende Interkonnektivität bedeutet, dass Unternehmen gleichzeitig stärker verteilt arbeiten.