What You Need to Know About “Harvest-Now, Decrypt-Later” Attacks

As quantum computing leapfrogs at great speed, the spotlight is now on post-quantum cryptography (PQC). Recently, NIST released the first three PQC encryption algorithm standards, urging organizations to test the new algorithms ...

Understanding Quantum Threats and How to Secure Data with Post-Quantum Cryptography

Post-Quantum Cryptography (PQC) is a new generation of encryption algorithms for protecting data against powerful quantum computers. Quantum computers use quantum mechanics to solve complex problems much faster than traditional computers. With ...
Wireshark SSLKEYLOGFILE

How to Inspect TLS Encrypted Traffic

Do you want to analyze decrypted TLS traffic in Wireshark or let an IDS, like Suricata, Snort or Zeek, inspect the application layer data of potentially malicious TLS encrypted traffic? There are ...
cryptography, quantum, computing, AI, DigiCert encryption,QKD quantum D-Wave

How to Achieve Crypto Resilience for a Post-Quantum World

While it's unlikely that quantum computers are currently in the hands of cybercriminals or hostile nation-states, they will be ...
Security Boulevard
RSA 2024: AI Security Takes Center Stage

RSA 2024: AI Security Takes Center Stage

While SOC optimization, NextGen SIEM, cloud and cybersecurity workforce challenges got ample attention at this year’s conference, it was the topic of AI, not surprisingly, that was at the center of most ...
Live at RSA: AI Hype, Enhanced Security, and the Future of Cybersecurity Tools

Live at RSA: AI Hype, Enhanced Security, and the Future of Cybersecurity Tools

In this first-ever in-person recording of Shared Security, Tom and Kevin, along with special guest Matt Johansen from Reddit, discuss their experience at the RSA conference in San Francisco, including their walk-through ...

RSAC 2024 Day 2: IoT Security Questions (and Answers)

RSA Conference delivers in terms of interesting dialogues with other cybersecurity professionals, and this year while there is not much on the conference agenda related to IoT security there is a lot ...
conference

What to Expect at RSA 2024: Will AI Wreak Havoc on Cybersecurity?

50,000 security practitioners are about to attend RSA 2024. Here’s what one expert anticipates for this year’s show ...
Security Boulevard

Improving Shor’s Algorithm

We don’t have a useful quantum computer yet, but we do have quantum algorithms. Shor’s algorithm has the potential to factor large numbers faster than otherwise possible, which—if the run times are ...
LLMs, Cybersecurity, AI, security, risk, Google AI LLM vulnerability

The Two Faces of AI in Identity Management

The advent of AI made identity the most-targeted part of the attack surface. But without AI, identity is a sitting duck ...
Security Boulevard