
Enoch Root
Articles
-
Jan 13, 2025 |
kaspersky.com | Stan Kaminsky |Enoch Root |Mikhail Sytnik
The old saying, “A chain is only as strong as its weakest link”, directly applies to enterprise cybersecurity. Businesses these days often rely on dozens or even hundreds of suppliers and contractors, who, in turn, use the services and products of yet more contractors and suppliers. And when these chains involve not raw materials but complex IT products, ensuring their security becomes significantly more challenging.
-
Jan 10, 2025 |
kaspersky.com | Enoch Root |Stan Kaminsky |Mikhail Sytnik
Researchers from three European universities recently demonstrated the so-called BadRAM attack. This attack is made possible because of a vulnerability in AMD EPYC processors, and primarily threatens cloud-solution providers and virtualization systems. In the worst-case scenario, the vulnerability could be used to compromise data from highly secure virtual machines. However, implementing this scenario in practice would be quite difficult.
-
Sep 27, 2024 |
kaspersky.com | Evgeniya Russkikh |Enoch Root |Stan Kaminsky
Skills shortages in the cybersecurity industry are hardly a new phenomenon; however, in recent years it has become painfully acute. The trigger was the coronavirus pandemic, which provoked rapid digitalization of most everything in the world, and an equally rapid increase in the number of cyberattacks. This led to demand for cybersecurity professionals seriously outstripping supply. ISC2, a leading cybersecurity expert-certification company, publishes its Cybersecurity Workforce Study every year.
-
Sep 26, 2024 |
kaspersky.com | Enoch Root
-
Aug 30, 2024 |
kaspersky.com | Alanna Titterington |Enoch Root |Stan Kaminsky
After many years of research and testing, in mid-August 2023, the U.S. National Institute of Standards and Technology (NIST) finally introduced fully-fledged post-quantum encryption standards — FIPS 203, FIPS 204, and FIPS 205. So let’s discuss them and see why they should be adopted as soon as possible. Why do we need post-quantum cryptography? First, let’s briefly outline the threat quantum computers pose to cryptography.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →