Quantum Communication Expands Over 250 Kilometers in Germany

Data Security

Quantum Communication Expands Over 250 Kilometers in Germany

Recent advancements in quantum communication technology mark a groundbreaking achievement in Germany, where researchers have successfully transmitted quantum messages over a distance exceeding 250 kilometers via existing telecommunication infrastructure. This pioneering effort demonstrates the feasibility of integrating quantum networks into

Are Educational Cloud Accounts at Risk from Storm-1977?

Data Security

Are Educational Cloud Accounts at Risk from Storm-1977?

Storm-1977 has posed a significant threat to the education sector by targeting cloud tenants through password spraying attacks over the past year. The attacks utilize AzureChecker.exe, a command-line tool leveraged to compromise educational accounts. The perpetrators extract AES-encrypted data from external servers, which include lists of targeted

Can Lattica’s FHE Revolutionize AI Privacy in Sensitive Sectors?

Data Security

Can Lattica’s FHE Revolutionize AI Privacy in Sensitive Sectors?

In a digital age where data breaches have become a worryingly familiar occurrence, guarding sensitive information while utilizing advanced technologies like artificial intelligence is paramount. Lattica is leading the charge in this domain by integrating Fully Homomorphic Encryption (FHE) into AI applications. This move has garnered the attention

Can CSignum’s Tech Revolutionize Underwater Communication?

Data Security

Can CSignum’s Tech Revolutionize Underwater Communication?

Underwater communication has long been a challenge, with traditional methods failing to provide reliable data transmission in such unforgiving environments. CSignum, a leader in underwater wireless technology, recently raised £6 million in a Series A funding round to enhance its capabilities in this domain. This funding, led by Archangels, Par

Is ThreatLocker Redefining Endpoint Security Standards?

Data Security

Is ThreatLocker Redefining Endpoint Security Standards?

In the cybersecurity world, Vernon Yai stands out as a leading authority on data protection, privacy, and governance. He is renowned for his innovative techniques in risk management, focused on safeguarding sensitive information. This interview explores Vernon's insights into building a successful venture in the ever-evolving field of

Azure Confidential VMs – A Review

Data Security

Azure Confidential VMs – A Review

As cloud security becomes increasingly paramount, Microsoft has bolstered its arsenal with the launch of Azure Confidential Virtual Machines (VMs). Notably, in response to significant breaches such as the Storm-0558 incident, Microsoft has made substantial strides to enhance security measures through the implementation of cutting-edge

1 9 10 11 12 13 14 15 37
1 11 12 13 37

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later