
The quantum apocalypse: What is post-quantum cryptography, and why do we need it? (Part 2 of 2)
Could quantum computers kill off encryption as we know it? If so, what can we do about it, and how long do we have to get ready?

Could quantum computers kill off encryption as we know it? If so, what can we do about it, and how long do we have to get ready?

Cybersecurity is no longer a “nice to have.” It’s a necessity for businesses of all sizes in all industries – whether or not they have a full-scale security team to implement and manage the program. However, setting up a cybersecurity program is significant work, and keeping up with best practices is challenging, even for large organizations. That’s why public cybersecurity frameworks have been developed. Cybersecurity frameworks are sets of standards and processes that businesses use to implement and manage security […]

Could quantum computers kill off encryption as we know it? If so, what can we do about it, and how long do we have to get ready?

We look at the sort of bugs that lead to cybersecurity trouble, the jargon you need to understand them, and why it can be a life’s work to keep on top of them.

Last year, mergers and acquisitions reached their lowest level in a decade but are now picking up again, says a report by PwC. However, the down market, geopolitical factors, and the immense growth in the use of digital technologies mean the approach to M&A deals will look very different in 2024. And cybersecurity tops the list of factors that need to be revisited. The 2020 pandemic drove companies towards digital transformation. This trend, which became central to many business models, […]

The ‘mal’ in malware is short for malicious, so clearly you can’t have ‘good’ malware.
Or can you?

It’s not often that we cover specific breaches, but sometimes one comes along that is so substantial and insightful that we believe it’s worth talking about. Such is the case with the recent Change Healthcare ransomware attack. This attack disrupted the entire U.S. healthcare system, forcing facilities to shut down, leaving patients without access to medication and care, and costing large hospitals and pharmacies upwards of $100 million per day. In many ways, the Change attack was nothing new. Bad […]

Avoiding public Wi-Fi while you are out and about is easier said than done.
Here are some simple precautions that can help.

The cybersecurity market is unfortunately loaded with acronyms that can make selecting the right security service confusing. Some of these acronyms overlap, while others have ambiguous meanings that differ depending on who’s providing them. The reason for this disparity in meanings is partly due to marketing hype—as a term becomes popular, marketing teams jump on the bandwagon, adding features to an existing service so they can say they have the same popular offering when, in reality, not much has changed. […]

Malware that’s already been identified and described in the media obviously can’t be “undetectable”, whatever the headlines say.

How can attackers hack you if they don’t know what to look for or how to find it? If you simply make everything in your network opaque, what could ever go wrong?

Companies that use managed services to close key skills gaps experience a 2.4x better “performance premium” than companies that use no managed services, according to a PwC survey of 2,000 companies. This premium includes both revenue growth and profit margin. A significant skills gap, that affects two-thirds of all companies, is the perennial cybersecurity labor shortage. According to the most recent ISC2 Cybersecurity Workforce Study, the world needs 4 million cybersecurity professionals to close this gap, even though the global […]

How hard can text-based scripts really be? The fact that we’ve had to split this article into two parts probably gives you a hint at the answer: very hard indeed.

How hard can text-based malware really be? The fact that we’ve had to split this article into two parts probably gives you a hint at the answer: very hard indeed.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






