News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Quantum-safe encryption
B2B Cyber ​​Security ShortNews

A provider of solutions that seamlessly extend Privileged Access Management (PAM) now offers effective protection against threats in the post-quantum computing era: quantum-safe encryption of secrets and credentials. Quantum-safe encryption on the Secret Server complies with NIST standards and enables organizations to protect critical credentials from access by quantum computers using one of four NIST-recommended asymmetric algorithms, CRYSTALS-Kyber. According to the Cybersecurity & Infrastructure Security Agency (CISA), “quantum computing opens up exciting new possibilities. However, the consequences of this new technology also include threats to…

Read more

Vulnerability in KYBER endangers post-quantum cryptography
B2B Cyber ​​Security ShortNews

KYBER, which is supposed to serve as the basis for post-quantum cryptography, probably still has vulnerabilities. Researchers have found a vulnerability in software libraries that can be circumvented using a timing-based attack. The National Security Agency (NSA), Facebook and Google are already relying on this. The KYBER key encapsulation method (KEM) was developed to replace classical encryption against cryptanalytic attacks using powerful quantum computers. It was developed by a team of developers from Europe and North America and is licensed under the Apache License 2.0. Vulnerability discovered in KYBER Researchers have discovered a vulnerability and are working on developing an attack...

Read more

The situation of IT security in Germany
B2B Cyber ​​Security ShortNews

This year's report "The situation of IT security in Germany" from the Federal Office for Information Security (BSI) offers a presentation and analysis of the cybersecurity landscape in Germany and shows that there is a need not only for securing companies and authorities, but also for There are still major challenges in recognizing the importance of digitalization and cybersecurity. Discussions about post-quantum cryptography (PQK) and the construction and use of a public key infrastructure (PKI) are also important topics in cybersecurity this year. The report highlights the need for a hybrid model that combines algorithms …

Read more

Highest encryption cracked with quantum computers?
Highest encryption cracked with quantum computers?

The currently highest encryption is the RSA-2048 key. The researcher Ed Gerck Ph.D, physicist and mathematician, now claims to have cracked this using a quantum computer. If all of this were true, all companies would have to put the topic of post-quantum cryptography – i.e. quantum-secure encryption – at the top of their to-do list. The news that researcher Ed Gerck claims to have cracked the RSA-2048 key is currently stirring up a lot of dust. He also claims to have achieved this with a commercial mobile phone or Linux desktop. Ultimately, this would mean that many encryptions for access and passwords in the future will be anything but secure...

Read more

Invest in post-quantum cryptography
B2B Cyber ​​Security ShortNews

Google is already using a quantum-safe encryption process (post-quantum cryptography) in its latest version of the Chrome browser. Companies should do the same. The quantum-safe key encapsulation process in the Chrome browser protects the exchange of symmetric keys when establishing secure TLS connections. Is this step necessary even though practical use of quantum computers is not yet foreseeable in the near future? Yes, says Nils Gerhardt, CTO at Utimaco. Preparing for the future “In fact, we cannot yet say when practical use of quantum computers can be expected or when criminals will have access to them. But…

Read more