SSH Communications Security CEO Teemu Tunkelo left the Finnish cybersecurity vendor abruptly Monday after low license sales in late 2023 slowed the company's growth. No reason was given for Tunkelo's departure, which stems from an agreement between the CEO and SSH and will take effect immediately.
A European court has sided with a Russian petitioner who challenged a Kremlin rule that requires telecom firms to backdoor their servers for law enforcement data collection. The court found that end-to-end encryption is essential to preserving the right to privacy in digital communication systems.
In the evolving landscape of CIP environments, Energy companies are facing mounting challenges as the dependence on Public Key Infrastructure (PKI) grows every day. A historical lack of tools and processes to properly monitor and maintain a PKI has left most organizations with unreliable identity and encryption...
Quantum computers are in their infancy but rapidly advancing, so firms need to upgrade security protocols now to address threats that quantum technology could one day pose to current cryptographic methods, said Clement Jeanjean, business operations lead in the quantum security group at SandboxAQ.
To help organizations refine their use of cryptography and safer software and to smooth their adoption of quantum-resistant cryptography, a team of researchers has released tools that generate a cryptographic bill of materials, or CBOM, says long-time security researcher Daniel Cuthbert.
The European telecom standards body behind a widely used radio encryption system will soon open-source its encryption protocols. The European Telecommunications Standards Institute on Tuesday said it will soon publish Terrestrial Trunked Radio, or TETRA, a European standard for radio communication.
A key European parliamentary committee on Tuesday voted to carve off encrypted communications from a legislative proposal directing online providers to diminish the risk of child sexual abuse material. The European Parliament's LIBE Committee emphatically rejected weakening end-to-end encryption.
European Union lawmakers and trading bloc governments reached a provisional agreement on a revised identity framework intended to digitize access to key public services for the majority of Europeans by the start of the next decade. The update is not universally welcomed by cybersecurity experts.
A scientist claims to have developed an inexpensive system for using quantum computing to crack RSA, which is the world's most commonly used public key algorithm. If true, this would be a breakthrough that comes years before experts predicted. Now, they're asking for proof.
A machine identity management provider led by an ex-Tricentis executive notched a $1.3 billion valuation after getting a minority investment from Sixth Street Group. Keyfactor said the funds will support high market demand for technology that secures devices and simplifies public key infrastructure.
The head of a key European Parliament committee said he's concerned about media reports suggesting that a proposal mandating that instant messenger apps scan for CSAM was crafted under the influence of an American tech foundation and a nonprofit with ties the British and U.S. government.
A day after the British Parliament approved a bill intended to eradicate child abuse content, cabinet officials called on social media giant Meta to halt a rollout of end-to-end encryption. Meta hasn't provided assurances that it will safeguard users, charged Home Secretary Suella Braverman.
Chinese hackers were able to access the email accounts of senior U.S. officials after Microsoft included an active digital signing key in a snapshot of data taken to analyze a crash of its consumer signing system in April 2021. Inclusion of the key in the crash dump was just one of many mishaps.
Security researchers uncovered multiple vulnerabilities in a widely used radio communication system used by law enforcement and in critical infrastructure for data transmission that could allow remote decryption of cryptographically protected communications.
As cloud services are on the rise with ever-growing workloads and more and more secrets being created by the R&D teams, the number and variety of secrets per organization are exploding. Needless to say, Secrets management and monitoring are crucial components of any security program.
This webinar will explore the...