Google Announces Quantum-Safe Digital Signatures in Cloud KMS

Google Announces Quantum-Safe Digital Signatures in Cloud KMS

Google announced on Thursday the development of quantum-safe digital signatures (FIPS 204/FIPS 205) in Google Cloud Key Management Service (Cloud KMS) for software-based keys. This is available in preview. The search giant also provided a high-level view into its post-quantum strategy for Google Cloud encryption products, including Cloud KMS and the Cloud Hardware Security Module (Cloud HSM). More Google news & tips Mounting concern over public-key cryptography systems This is significant, the company said, because…

Read More

15 Months of Powerful Cyber Protection and Backup for Only $30

15 Months of Powerful Cyber Protection and Backup for Only

TL;DR: Get the ultimate in cyber protection with a 15-month subscription to 50GB Norton 360 Deluxe PC Cloud Storage Backup for 5 Devices — now 71% off for a best-on-web price of $29.99. If you’ve been worrying about data security because strong cloud storage backup is either too expensive or offers too little space for your files, then worry no more. A 15-month subscription to 50GB Norton 360 Deluxe PC Cloud Storage Backup for 5…

Read More

Cisco and Wiz Collaborate to Enhance Cloud Security: Tackling AI-Generating Threats in Complex IT Infrastructures

Cisco and Wiz Collaborate to Enhance Cloud Security: Tackling AI-Generating Threats in Complex IT Infrastructures

A Growing Challenge in Cloud Security In today’s fast-paced digital world, enterprises face a new urgency in cloud security. AI-driven tools have drastically reduced the time it takes to develop exploit kits, from 15 days to under 5. However, enterprise teams often need over 60 days to patch vulnerabilities across varied environments. This leaves a significant gap where businesses are vulnerable to malicious actors. Cisco and Wiz: Better Together In response to this critical challenge,…

Read More

Economic stress was the leading cause of project delays in 2024

Economic stress was the leading cause of project delays in 2024

Genetec shared the results of their 2025 State of the Physical Security Report, including hybrid-cloud security, artificial intelligence (AI), and staff concerns. According to the report, 43% of end users envision hybrid deployments as their preferred approach within the next five years, compared to 18% favoring fully cloud-based implementations and 17% planning to remain fully on-premises. This preference for hybrid-cloud is echoed by consultants and channel partners, with 66% of consultants planning to recommend hybrid…

Read More

UK Government Reportedly Demands Access to Encrypted iCloud Files

UK Government Reportedly Demands Access to Encrypted iCloud Files

The U.K.’s office of the Home Secretary has allegedly asked Apple to provide a backdoor into any material any user has uploaded to iCloud worldwide, The Washington Post reported on Feb. 7. Anonymous sources provided The Washington Post the information and expressed concerns about tech companies being leveraged for government surveillance. Apple has not commented; however, in March, the company provided a statement to Parliament on the occasion of receiving notice of a potential request,…

Read More

Harnessing AI to Simplify Cloud Configuration Drift Detection

Harnessing AI to Simplify Cloud Configuration Drift Detection

Cloud environments are dynamic by nature; they frequently change and update configurations. Unless these changes are carefully tracked, they could lead to configuration drift, a situation in which the runtime state of a resource deviates from its intended baseline configuration. Configuration drift can have severe consequences, potentially introducing security vulnerabilities, degrading system performance, and violating compliance requirements.  Manual configuration drift management in large, multi-cloud environments is inefficient and prone to human error. AI helps to…

Read More

Are Long-Lived Credentials the New Achilles' Heel for Cloud Security?

Are Long-Lived Credentials the New Achilles' Heel for Cloud Security?

The head of security advocacy at Datadog, a cloud-based monitoring and analytics platform, has urged enterprises in Australia and the APAC region to accelerate phasing out long-lived credentials for popular hyperscale cloud services, warning that they remain a serious data breach risk. Speaking with TechRepublic, Andrew Krug highlighted findings from Datadog’s State of Cloud Security 2024 report, which identified long-lived credentials as a persistent security risk factor. While credential management practices are improving, Krug noted…

Read More

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

As cloud environment evolve, efficient and effective workload security has been at the top of the list. At Cisco, we have integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance. Why Isovalent? The Isovalent platform is based on the eBPF (extended Berkeley Packet Filter) technology that offers a very modern approach to securing cloud-native environments. Where traditional security solutions usually fail to keep up with the…

Read More

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

As cloud environment evolve, efficient and effective workload security has been at the top of the list. At Cisco, we have integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance. Why Isovalent? The Isovalent platform is based on the eBPF (extended Berkeley Packet Filter) technology that offers a very modern approach to securing cloud-native environments. Where traditional security solutions usually fail to keep up with the…

Read More

How to Protect Your Social Media Passwords with Multi-factor Verification | McAfee Blog

How to Protect Your Social Media Passwords with Multi-factor Verification | McAfee Blog

Two-step verification, two-factor authentication, multi-factor authentication…whatever your social media platform calls it, it’s an excellent way to protect your accounts. There’s a good chance you’re already using multi-factor verification with your other accounts — for your bank, your finances, your credit card, and any number of things. The way it requires an extra one-time code in addition to your login and password makes life far tougher for hackers. It’s increasingly common to see nowadays, where…

Read More
1 2 3 15