News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

PQC encryption: Post-Quantum Cryptography Standards
PQC encryption: Post-Quantum Cryptography Standards

Almost two months ago, the National Institute of Standards and Technology (NIST) presented a first draft on a topic that will keep cyber security managers of all companies worldwide busy in the coming years and decades. Its title: Transition to Post-Quantum Cryptography (PQC) Standards. Its core message: Many currently approved quantum computer-vulnerable encryption systems, such as RSA, ECDSA, EdDSA, DH and ECDH, will be classified as obsolete by NIST from 2030 and will no longer be approved from 2035. Encryption systems are used in practically all sensitive and vulnerable areas of a company today: to secure the data in use...

Read more

AI and quantum-safe data security center
AI and quantum-safe data security center Image: Bing - AI

As hybrid cloud, AI and quantum risks upend the traditional data security paradigm, IBM is launching IBM Guardium Data Security Center, enabling organizations to protect data in any environment, throughout its lifecycle, and with unified controls. IBM Guardium Data Security Center provides a unified view of enterprise data assets and enables security teams to integrate workflows and consolidate data monitoring and governance, data detection and response, data and AI security management, and cryptography management into a single dashboard. IBM Guardium Data Security Center includes generative AI capabilities that enable…

Read more

authentication codes cracked
authentication codes cracked

Researchers in China have demonstrated an approach that successfully targets shorter authentication and encryption codes - but not yet the longer, more secure ones currently in use. The research results increase the threat level for cryptographic systems. Although they used a quantum computer to decrypt an RSA encryption, they only used a 50-bit integer for the RSA encryption. This is only 9,67 x 10^16 possible values. Nevertheless, the results should not be underestimated and unfortunately this news has been somewhat overlooked. It is a wake-up call for all companies that encrypt their data, apart from simple...

Read more

Quantum-safe encryption
B2B Cyber ​​Security ShortNews

A provider of solutions that seamlessly extend Privileged Access Management (PAM) now offers effective protection against threats in the post-quantum computing era: quantum-safe encryption of secrets and credentials. Quantum-safe encryption on the Secret Server complies with NIST standards and enables organizations to protect critical credentials from access by quantum computers using one of four NIST-recommended asymmetric algorithms, CRYSTALS-Kyber. According to the Cybersecurity & Infrastructure Security Agency (CISA), “quantum computing opens up exciting new possibilities. However, the consequences of this new technology also include threats to…

Read more

Vulnerability in KYBER endangers post-quantum cryptography
B2B Cyber ​​Security ShortNews

KYBER, which is supposed to serve as the basis for post-quantum cryptography, probably still has vulnerabilities. Researchers have found a vulnerability in software libraries that can be circumvented using a timing-based attack. The National Security Agency (NSA), Facebook and Google are already relying on this. The KYBER key encapsulation method (KEM) was developed to replace classical encryption against cryptanalytic attacks using powerful quantum computers. It was developed by a team of developers from Europe and North America and is licensed under the Apache License 2.0. Vulnerability discovered in KYBER Researchers have discovered a vulnerability and are working on developing an attack...

Read more

The situation of IT security in Germany
B2B Cyber ​​Security ShortNews

This year's report "The State of IT Security in Germany" by the Federal Office for Information Security (BSI) provides a presentation and analysis of the cybersecurity landscape in Germany and shows that there are still major challenges not only in securing companies and authorities, but also in the perception of the importance of digitization and cybersecurity. Discussions about post-quantum cryptography (PQK) and the development and use of a public key infrastructure (PKI) are also important topics in cybersecurity this year. The report highlights the need for a hybrid model that combines algorithms from…

Read more

Highest encryption cracked with quantum computers?
Highest encryption cracked with quantum computers?

The currently highest encryption is the RSA-2048 key. The researcher Ed Gerck Ph.D, physicist and mathematician, now claims to have cracked this using a quantum computer. If all of this were true, all companies would have to put the topic of post-quantum cryptography – i.e. quantum-secure encryption – at the top of their to-do list. The news that researcher Ed Gerck claims to have cracked the RSA-2048 key is currently stirring up a lot of dust. He also claims to have achieved this with a commercial mobile phone or Linux desktop. Ultimately, this would mean that many encryptions for access and passwords in the future will be anything but secure...

Read more

Invest in post-quantum cryptography
B2B Cyber ​​Security ShortNews

Google is already using a quantum-safe encryption process (post-quantum cryptography) in its latest version of the Chrome browser. Companies should do the same. The quantum-safe key encapsulation process in the Chrome browser protects the exchange of symmetric keys when establishing secure TLS connections. Is this step necessary even though practical use of quantum computers is not yet foreseeable in the near future? Yes, says Nils Gerhardt, CTO at Utimaco. Preparing for the future “In fact, we cannot yet say when practical use of quantum computers can be expected or when criminals will have access to them. But…

Read more