Details surrounding the SWEET32: Birthday attacks on 64-bit block ciphers in TLS and OpenVPN can…
Blog Posts
At Black Hat USA 2016, doctoral candidates Mathy Vanhoef and Tom Van Goethem presented HEIST, an…
Health care organizations face unique security challenges, stemming from the sensitive data they regularly work…
What exactly is an insider threat? Concerns about this particular risk vector have risen throughout…
Cryptography was originally developed to secure communications, i.e., data in transit (alternatively, data in motion)….
Back in 1998 I went onto AskJeeves in search of a local store where I…
It is time for an update on the Baseline Requirements for Code Signing. First the…
Emerging vulnerabilities underscore the argument for creating a safer Internet for everyone including domain owners…
As hubs of research, academia and culture, colleges have been targets of hackers on more…
Many public transit infrastructures around the world are in the midst of big technological upgrades….