Techniques too tough for quantum computing solutions will be part of public cloud and tape storage encryption. IBM researchers have announced development of new “quantum safe” encryption techniques that they plan to deploy to the IBM Public Cloud in 2020. The techniques have also been prototyped as part of a quantum safe enterprise class tape
In the office, cybersecurity is everyone’s responsibility. By reminding your employees of these simple online safety best practices, your organization can avoid becoming the next victim of a cyber-attack. Check out the tips below to improve your organization’s cybersecurity defenses and minimize risk. Lock it up Modern workplaces are often split between multiple locations and may
Well-crafted narratives can help you win over users in the battle to develop a sustainable cybersecurity culture. When was the last time you felt a deep emotional connection to a PowerPoint slide? How often do you find yourself enraptured by a lecture? Take a moment to imagine the sheer number of corporate presentations, training sessions,
When it comes to operational technology and industrial control systems, make sure you’re the lord of all you survey. Digital transformation has dramatically changed the world of industrial control systems (ICS) and operational technology (OT) all the way up to today, when they have joined the online world with direct factory-floor connections to the Internet.
As crowdsourced security-testing surges in popularity, companies need to implement safe harbor provisions to protect good-faith hackers — and themselves. Bug bounty programs are surging in popularity, as more companies — both public and private — use freelance security researchers to spot vulnerabilities in their systems and help protect valuable customer data. According to the
The same encryption that secures private enterprise data also provides security to malware authors and criminal networks. The same technology millions depend on to protect personal and confidential information — and that browsers highlight as crucial for secure browsing — is being used by threat actors to hide malicious payloads and criminal activity targeting corporations