article thumbnail

The War in Technology: A Digital Iron Curtain Goes Up

SecureWorld News

Many threats that have until now been theoretical—like creation of a "Ru-net" as an alternative to the Internet—are becoming a reality. Cutting off Internet access to a country the size of Texas is not as simple as cutting a few cables or bombing a few cell towers. There are many tech angles to the war in Ukraine.

article thumbnail

How 5G Operators Can Prepare for The Quantum Era

Thales Cloud Protection & Licensing

This expansion and significant architectural changes will create highly complex networks, exposing new vulnerabilities and more significant risks as we move towards a post-quantum (PQ) world. How Thales Can Help Thales, a leading provider of PQC solutions, has been actively involved in R&D and standardization efforts since 2013.

Mobile 71
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Post-Quantum Cryptography: Lessons Learned from SHA-1 Deprecation

Security Boulevard

SHA-1 was officially deprecated by NIST in 2011 and its usage for digital signatures was prohibited in 2013. Prepare a quantum-safe architecture now. Since 2005, SHA-1 has been regarded as unsafe against well-funded adversaries. Since 2020, chosen-prefix attacks against SHA-1 are feasible.

article thumbnail

Why SASE matters and what security pros need to know

SC Magazine

Think of SASE as an architecture model, although sometimes it’s referred to as a concept or framework. Cloud-Access Security Broker (CASB): CASBs first appeared on the market in 2013. However, there are many ways to interpret the SASE architecture and thus, many ways to approach it.

article thumbnail

NEW TECH: Trend Micro inserts ‘X’ factor into ‘EDR’ – endpoint detection and response

The Last Watchdog

Here are my big takeaways: Prevention vs. detection In 2013, Gartner analyst Anton Chuvakin coined “EDR” to classify an emerging set of tools designed to go beyond signature-based antivirus software which was designed primarily to identify specific malicious binary files. For a full drill down, give a listen to the accompanying podcast.

Antivirus 147
article thumbnail

MY TAKE: Six-figure GDPR privacy fines reinforce business case for advanced SIEM, UEBA tools

The Last Watchdog

Different flavors of cloud architectures, sprawling IoT systems and the coming wide deployment of 5G networks add up to not just Big Data, but Very Big Data. Launched in 2013 by Nir Polak , a former top exec at web application firewall vendor Imperva, Exabeam appears to be on the right track. million, on average. Talk more soon.

Big data 153
article thumbnail

BEST PRACTICES: How testing for known memory vulnerabilities can strengthen DevSecOps

The Last Watchdog

Over a five year period the number technical software vulnerabilities reported to the National Institute of Standards and Technology’s National Vulnerability Database (NVD) more than tripled – from 5,191 in 2013 to a record 16,556 in 2018. Total vulnerabilities reported in the NVD dropped a bit in 2019, down to 12,174 total flaws.

Software 133