Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Post-quantum cryptography (PQC): how to build resilience while padlocks still work

This blog is the second part of a two-part series on post-quantum cryptography (PQC). In Part 1, we explored how the Harvest Now, Decrypt Later (HNDL) strategy has moved from crypto-conspiracy theory to a real threat model. This follow-up dives into how forward-thinking enterprises are already operationalizing PQC in their day-to-day security efforts—and how your team can take practical steps to do the same before quantum risk becomes quantum reality.

Cryptography Terms Explained: Definitions And Concepts Made Simple

Interested in learning more about cryptography but don’t know where to start? We break down the common cryptography terms in a simple and clear way, to help you understand how companies encrypt your data in a safe and secure way. From there, you can dive deeper into the world of cryptography and learn more about this important and fascinating concept.

Mamona Ransomware (RAAS) - Offline Commodity Ransomware with Custom Encryption

A newly identified strain of commodity ransomware named Mamona has emerged in the cybercriminal underground. This threat diverges from typical ransomware-as-a-service (RaaS) models by functioning entirely offline, relying on custom-built cryptographic routines and deploying no external command-and-control (C2) infrastructure.

What is FIPS 140-3?

Encryption has become a vital data protection tool used by global governments, defense and enterprises. However, not all solutions use the same cipher techniques. Several encryption algorithms can be used to secure data with varying levels of security. To establish acceptable standards for encryption technologies utilized by the U.S. Government, the National Institute of Standards and Technology (NIST) published the Federal Information Processing Standards (FIPS) FIPS-140.

Lattica Emerges from Stealth to Solve AI's Biggest Privacy Challenge with FHE

Lattica emerges from stealth with $3.25 million in pre-seed funding. The round was led by Konstantin Lomashuk's Cyber Fund, with participation from angel investor Sandeep Nailwal, co-founder of Polygon Network and Sentient: The Open AGI Foundation, among others.

Can End-to-End Encryption Be Hacked?

We have become so reliant on communicating on the Internet that sometimes we need to take a minute to consider how our data is being protected and whether what we send on the Internet is truly safe. While end-to-end encryption has become integral to protecting our data online, you may be thinking, can end-to-end encryption be hacked?

How Safe and Attack-Proof Are Encrypted Apps?

In today’s digital landscape, encrypted messaging apps are widely regarded as essential tools for secure communication. Businesses and individuals alike turn to platforms like Signal, WhatsApp, and Telegram to protect sensitive conversations from prying eyes. But how secure are these apps really? Are they truly attack-proof, or do they provide a false sense of security?

How to Protect Your Live Stream from Hackers and Unauthorized Access

Live streaming has become extremely popular. Whether it's for gaming, business meetings, or virtual fitness classes, it's an easy way to connect with people in real time. However, just like any other online activity, live streaming has its risks, especially when it comes to hackers or unauthorized access. Imagine you are hosting a big event, and suddenly, someone hijacks your stream. It will disrupt everything and lead to stealing sensitive information or damaging your reputation. Let's look through the simple ways to protect your live stream.

How Ditching RSA Made Teleport 77% More CPU-Efficient

In Teleport 17 we made the switch from RSA to ECDSA and Ed25519, and it paid off with improved security and significant performance benefits. This was a major undertaking; Teleport has used 2048-bit RSA keys for just about everything since our initial release. Switching to new key types and signature algorithms came with serious compatibility concerns given the broad range of environments Teleport is deployed in and the number of third party tools that use or trust Teleport-issued certificates.