The quantum threat to both symmetric and asymmetric cryptography is that a secret key is brute forced by a quantum computer. But, how this is achieved by quantum computers is different. The attack on a symmetric key pair is the same as that performed by the computers of today, in that the quantum computer will…
Category: cyber security
ISO/IEC publish ‘Cloud Computing Vocabulary’ standard
Unsure of the difference between public, private, hybrid or community cloud deployment models? Check out some helpful vocab and definitions in the recently published Joint Information and Telecommunication (JTC1) standard: ISO/IEC 22123-1:2021. In defining terms such as roles and activities, the difference between characteristics and capabilities, this new standard helps to demystify and remove some…
Application Security: Prevention beats cure
Prevention of risk is a priority for many of us in both personal and professional lives. This holds true now more than ever with not only the covid-19 pandemic but also the proliferation of attack vectors targeting our personal and business information. The questions then becomes, how do we consider the “prevention is better than…
‘Cyber strength now key to national security,’ says UK Government
The UK government has published its strategic goals in the run up to 2025 – and cybersecurity is at the heart of them. In what has been billed as the largest security and foreign policy strategy revamp since the Cold War, the UK government has outlined its new defense priorities – with at their heart, the imperative…
Microsoft’s latest cloud authentication outage: What went wrong
Microsoft is saying a ‘rotation of keys’ that handle authentication was to blame for a roughly 14-hour Azure outage that took down Office 365, Dynamics 365, Xbox Live and other Microsoft services on March 15th. Microsoft has published a preliminary root cause analysis of its March 15 Azure Active Directory outage, which took down Office,…
