article thumbnail

NIST’s Post-Quantum Cryptography Standards

Schneier on Security

NIST is an old hand at this competitive process, having previously done this with symmetric algorithms (AES in 2001) and hash functions (SHA-3 in 2015). It took a couple of decades to fully understand von Neumann computer architecture; expect the same learning curve with quantum computing.

article thumbnail

News Alert: Swissbit introduces small-capacity memory for IIoT, smart city applications

The Last Watchdog

The models of the EM-30 and S-56(u) series, which are available as an embedded component in the form of an e.MMC or as flexible, interchangeable SD memory cards, offer maximum reliability due to proven firmware architecture. Swissbit was founded in 2001 and has offices in Switzerland, Germany, USA, Japan and Taiwan. 2 and 2.5”

IoT 184
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

It’s a party! Cisco SecureX at RSAC and Cisco Live US 2022

Cisco Security

We’ll have experts on hand to walk you through what we can learn from a feed of RSA Conference traffic throughout the week, using multiple Cisco Secure products, pulled together with the SecureX cross-platform architecture. HOLSEC-2001.a HOLSEC-2001.b Cisco SecureX at Cisco Live 2022. You are invited.

Firewall 112
article thumbnail

Cyber Security Roundup for March 2021

Security Boulevard

The sudo vulnerability aka CVE-2001-3156 , seemed to go under the radar after it was announced and patches were released on 26th January 2021. Last month a newly discovered critical vulnerability in 'sudo', a fundamental program present in all Linux and Unix operating systems caught my eye.

article thumbnail

It’s not ‘See you later.’ It’s ‘Goodbye’: Moving on from Tokenization in the age of Ransomware

CyberSecurity Insiders

Tokenization was invented a little over twenty years ago in 2001 to address the risk of losing cardholder data from eCommerce platforms. Encryption-in-use supports various architectures, including being directly utilized in datastores/apps or tokenization vaults where tokens are provided to primary datastores/apps.

article thumbnail

Episode 180: Gary McGraw on Machine Learning Security Risks

The Security Ledger

Stories about machines acting logically – but based on faulty or incorrect assumptions – are the fuel for science fiction tales ranging from 2001: A Space Odyssey (Arthur C. Spotlight Podcast: How Machine Learning is revolutionizing Application Fuzzing. Gary McGraw is the Co-Founder of the Berryville Institute of Machine Learning.

Risk 52
article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

By 2001, the NIST dubbed it the Advanced Encryption Standard (AES) and officially replaced the use of DES. While initial standards are expected by 2024, a full mitigation architecture for federal agencies isn’t expected until 2035. In 1997, the NIST renewed its call to the public cryptography community for the successor to DES.