rsa
What You Need to Know About “Harvest-Now, Decrypt-Later” Attacks
As quantum computing leapfrogs at great speed, the spotlight is now on post-quantum cryptography (PQC). Recently, NIST released the first three PQC encryption algorithm standards, urging organizations to test the new algorithms ...
Understanding Quantum Threats and How to Secure Data with Post-Quantum Cryptography
Post-Quantum Cryptography (PQC) is a new generation of encryption algorithms for protecting data against powerful quantum computers. Quantum computers use quantum mechanics to solve complex problems much faster than traditional computers. With ...

How to Inspect TLS Encrypted Traffic
Do you want to analyze decrypted TLS traffic in Wireshark or let an IDS, like Suricata, Snort or Zeek, inspect the application layer data of potentially malicious TLS encrypted traffic? There are ...

How to Achieve Crypto Resilience for a Post-Quantum World
While it's unlikely that quantum computers are currently in the hands of cybercriminals or hostile nation-states, they will be ...

RSA 2024: AI Security Takes Center Stage
While SOC optimization, NextGen SIEM, cloud and cybersecurity workforce challenges got ample attention at this year’s conference, it was the topic of AI, not surprisingly, that was at the center of most ...

Live at RSA: AI Hype, Enhanced Security, and the Future of Cybersecurity Tools
In this first-ever in-person recording of Shared Security, Tom and Kevin, along with special guest Matt Johansen from Reddit, discuss their experience at the RSA conference in San Francisco, including their walk-through ...
RSAC 2024 Day 2: IoT Security Questions (and Answers)
RSA Conference delivers in terms of interesting dialogues with other cybersecurity professionals, and this year while there is not much on the conference agenda related to IoT security there is a lot ...

What to Expect at RSA 2024: Will AI Wreak Havoc on Cybersecurity?
50,000 security practitioners are about to attend RSA 2024. Here’s what one expert anticipates for this year’s show ...
Improving Shor’s Algorithm
We don’t have a useful quantum computer yet, but we do have quantum algorithms. Shor’s algorithm has the potential to factor large numbers faster than otherwise possible, which—if the run times are ...

The Two Faces of AI in Identity Management
The advent of AI made identity the most-targeted part of the attack surface. But without AI, identity is a sitting duck ...