The domestic intelligence chiefs of the “Fives Eyes” – Australia, Canada, US, New Zealand and UK – say that they are seeing a sharp rise in attempts by hostile states to steal intellectual property. The intelligence chiefs spoke at an event hosted by Stanford University’s Hoover Institution. This is a little different that what the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I have written several times about the need to start thinking about post-quantum crypto. At this point, “Q-Day” is somewhere between this year and ten years from now. If you believe my blog last week, Q-Day could be today. NIST has published draft post quantum standards, but there is a lot more to do besides […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Researchers are highly skeptical about the claim of another scientist who says that he has developed an inexpensive system to crack RSA encryption, the most commonly used public key encryption. The researcher who claims to have cracked RSA is Ed Gerck. According to his LinkedIn profile, he is a quantum computing developer at a company […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
One more time, Okta was attacked and customer data and systems compromised. I am going to leave the conversation about whether or not you should use Okta vs. a competitor to a separate conversation, but it seems that their security may be a bit lacking. In this most recent attack, the Okta support system was […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Regulators, Insurers and Customers All Going After Progress SW In Progress Software’s 10-Q, it reported that the SEC is going after them due to the MOVEit breach; also a slew of lawsuits in multiple countries. They are also cooperating various privacy regulators. The only winners are the lawyers. Credit: The Register Twitter Usage Still Down […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
California’s privacy regulator has released draft regs covering cybersecurity audit requirements and risk assessments. While they have not started the formal rulemaking process, they are putting out bait to see what kind of comments they get. They also discussed the drafts at their last meeting. The Draft Cybersecurity Audit Regulations make both modifications and additions to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]