720-891-1663

UK Updates Post-Quantum Crypto Guidance

I have written several times about the need to start thinking about post-quantum crypto. At this point, “Q-Day” is somewhere between this year and ten years from now. If you believe my blog last week, Q-Day could be today. NIST has published draft post quantum standards, but there is a lot more to do besides […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Researcher Claims to Have Cracked RSA-2048 With Quantum Computer

Researchers are highly skeptical about the claim of another scientist who says that he has developed an inexpensive system to crack RSA encryption, the most commonly used public key encryption. The researcher who claims to have cracked RSA is Ed Gerck. According to his LinkedIn profile, he is a quantum computing developer at a company […]

Continue reading → [DISPLAY_ACURAX_ICONS]

US Led Coalition Vows to not pay Hackers’ Ransom Demands

We shall see if this really works, but if it REDUCES payments, that will be good. A joint pledge was announced at the third annual International Counter Ransomware Initiative or CRI. The CRI includes 48 countries, the EU and Interpol. Anne Neuberger described the situation saying that dozens of GOVERNMENTS signed a policy statement saying […]

Continue reading → [DISPLAY_ACURAX_ICONS]

A Warning for Founders About Open Source Software and Lean Teams

Founders of startups are mostly interested in getting a minimal viable product (MVP) out the door as quickly as possible. This is quite reasonable and what the investors likely want. After all, if there is no product, there is no revenue. The solution to this is, among other things, to reduce cost by relying on […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Okta Attack Points Out Important Issues

One more time, Okta was attacked and customer data and systems compromised. I am going to leave the conversation about whether or not you should use Okta vs. a competitor to a separate conversation, but it seems that their security may be a bit lacking. In this most recent attack, the Okta support system was […]

Continue reading → [DISPLAY_ACURAX_ICONS]

The Core Problem with Cybersecurity and Privacy Laws

California just passed the delete your data law, which, once in effect, will be the do-not-call list version of opting out. The law requires brokers to check their data against the delete me list and delete any data belonging to that person if there is a match. They have to repeat the check at least […]

Continue reading → [DISPLAY_ACURAX_ICONS]