Reports

IBM Quantum Computer

How NIST Is Securing The Quantum Era

Quantum computers powerful enough to break the strongest classical encryption are at least a decade away, but the time to develop quantum safe encryption is now. In this opinion piece, Thomas Pöppelmann, a Senior Staff Engineer, Security Architecture and Cryptography Research at Infineon Technologies talks about the steps NIST and companies like Infineon are taking to make that happen.

Password Image

What’s Good IAM? The Answer may depend on your Industry

Mature identity and access management (IAM) is a pillar of enterprise security. But what makes IAM “good” for your business may depend on the kind of business you are in, and the demands of your industry, writes Rachael Stockton of LogMeIn and LastPass.

Passwords Concept

Password Psychology: users know reuse is bad, do it anyway

More than 90% of employees know re-using passwords between accounts is a dangerous business, but two thirds of them do it anyway. Rachael Stockton of LastPass digs into the “why” of password insecurity in the latest LastPass Psychology of Passwords report.

Code on Screen

Firms are embracing Open Source. Securing it? Not so much.

The good news: open source software is nearly universal. The bad news: half of source code repositories contains open source code containing high-risk vulnerabilities, according to a new report released by the firm Synopsys.

Cloud Security Image

Scale Cloud Security Engineering by delivering Security -as-Code

As security “shifts left,” we need to arm engineers with automated security delivered as code, so they can effectively protect our public cloud infrastructures.