Saturday, February 22, 2025
Tag:

Cybersecurity

Microsoft’s Majorana 1 quantum chip could break encryption and expose your data to hackers

Microsoft is moving closer to quantum computing supremacy with its Majorana 1 chip, a development that could change cybersecurity forever. While the Windows-maker touts...

Punycode: The invisible cyber threat hiding in plain sight

The internet was conceived to connect the world, and internationalized domain names (IDNs) have certainly helped make that vision a reality. By allowing non-ASCII...

Strengthening cyber resilience — cautious collaboration between organizations and third-party vendors needed

Ransomware is continuously on the rise. Despite multiple major law enforcement actions against ransomware groups over the past year, there has been a significant...

Right now, there is no right or wrong SASE answer 

Adoption of SASE, or secure access service edge, is accelerating -- especially, according to IDC, at organizations of over 1,000 employees, while it’s estimated...

A third of people would like to delete themselves from the internet

Around a third of web users say they would like to delete themselves from the internet, with people in the US and Canada being...

A new age of fraud: building resilience against adversary-in-the-middle attacks 

From phishing scams to business email compromise, fraud is continually evolving and cybercriminals are using increasingly refined tactics to exploit vulnerabilities. Adversary-in-the-middle (AiTM) attacks...

Why it’s time to guarantee resilience in our critical software

Software has become central to our daily lives, with nearly every major company relying on it to operate. We are all increasingly dependent on...

Enterprise tech buyers reveal their 2025 spending priorities

A new report from Crane Venture Partners looks at the priorities of senior executives who collectively influence $3–$4 billion in annual technology spending. Respondents include...