|
You are here |
www.f5.com | ||
| | | | |
www.trendmicro.com
|
|
| | | | | We take a closer look at the operations of Clop, a prolific ransomware family that has gained notoriety for its high-profile attacks. We review this ransomware group's constantly changing schemes and discuss how companies can shore up defenses against this threat. | |
| | | | |
www.schneier.com
|
|
| | | | | Today's world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to store on your smartphone, or what to share on social media requires us to assess risks and make judgments accordingly. Arriving at any conclusion is an exercise in threat modeling. In security, threat modeling is the process of determining what security measures make sense in your particular situation. It's a way to think about potential risks, possible defenses, and the costs of both. It's how experts avoid being distracted by irrelevant risks or overburdened by undue costs... | |
| | | | |
vvx7.io
|
|
| | | | | Adventure! Danger! Immutable Archives! InterPlanetary File System is a peer-to-peer distributed file system that stores immutable, content-addressed blocks of data using Merkle DAG objects. If that description doesn't resonate, it's fair to think of IPFS as a versioned content delivery network where each node in the network can act as both a client and a server. IPFS is the brain child of Juan Benet and one of several projects by Protocol Labs whose FileCoin ICO raised more than $250 million USD in 2017. | |
| | | | |
securityinaction.wordpress.com
|
|
| | | ==================== TL; DR With the recent publication of post quantum cryptography (PQC) algorithms from NIST, organisations of all size should begin the transition to PQC. Please refer to this PQC readiness publication from CISA as a starting point. ==================== To assist with the transition to PQC, I have provided advice below for government agencies and... | ||