In his first week in his new role as interim CEO of SSH Communications Security, Rami Raulas shares insights on the company’s strategic focus on zero trust, operational technology security, and quantum-safe cryptography to address evolving cybersecurity challenges.
SSH Communications Security CEO Teemu Tunkelo left the Finnish cybersecurity vendor abruptly Monday after low license sales in late 2023 slowed the company's growth. No reason was given for Tunkelo's departure, which stems from an agreement between the CEO and SSH and will take effect immediately.
A European court has sided with a Russian petitioner who challenged a Kremlin rule that requires telecom firms to backdoor their servers for law enforcement data collection. The court found that end-to-end encryption is essential to preserving the right to privacy in digital communication systems.
In the evolving landscape of CIP environments, Energy companies are facing mounting challenges as the dependence on Public Key Infrastructure (PKI) grows every day. A historical lack of tools and processes to properly monitor and maintain a PKI has left most organizations with unreliable identity and encryption...
Quantum computers are in their infancy but rapidly advancing, so firms need to upgrade security protocols now to address threats that quantum technology could one day pose to current cryptographic methods, said Clement Jeanjean, business operations lead in the quantum security group at SandboxAQ.
To help organizations refine their use of cryptography and safer software and to smooth their adoption of quantum-resistant cryptography, a team of researchers has released tools that generate a cryptographic bill of materials, or CBOM, says long-time security researcher Daniel Cuthbert.
The European telecom standards body behind a widely used radio encryption system will soon open-source its encryption protocols. The European Telecommunications Standards Institute on Tuesday said it will soon publish Terrestrial Trunked Radio, or TETRA, a European standard for radio communication.
A key European parliamentary committee on Tuesday voted to carve off encrypted communications from a legislative proposal directing online providers to diminish the risk of child sexual abuse material. The European Parliament's LIBE Committee emphatically rejected weakening end-to-end encryption.
European Union lawmakers and trading bloc governments reached a provisional agreement on a revised identity framework intended to digitize access to key public services for the majority of Europeans by the start of the next decade. The update is not universally welcomed by cybersecurity experts.
A scientist claims to have developed an inexpensive system for using quantum computing to crack RSA, which is the world's most commonly used public key algorithm. If true, this would be a breakthrough that comes years before experts predicted. Now, they're asking for proof.
A machine identity management provider led by an ex-Tricentis executive notched a $1.3 billion valuation after getting a minority investment from Sixth Street Group. Keyfactor said the funds will support high market demand for technology that secures devices and simplifies public key infrastructure.
Year after year, the rise in large-scale data breaches is faster and steeper. Not only is your business at risk, but so are your customers – as we keep learning, the hard way.
As we adjusted to the pandemic, cybersecurity trended – quite unfortunately – in the wrong direction. While our work lives merged with...
Password security is a critical start for protecting devices and networks from malicious threats. However, implementing successful password security can be easier said than done. Do you have employees who are worried they won't remember something more complex than "password123"? Are you looking for 7 actionable steps...
Protecting your data from breaches is only one aspect of enterprise security, but it's important to go further to ensure that your secrets will remain safe – even in the unlikely event of a breach. Your information shouldn't just be protected by an account password, but also by a unique Secret Key: a 128-bit,...
The best way to level-up your existing IAM infrastructure is to add a single sign-on (SSO) to protect logins for approved apps. This guide will show you the benefits of a combined approach, in which company-approved and non-approved logins are attached to a single, strongly vetted identity to simplify administration,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.