WithSecure

WithSecure’s USB armory enables post-quantum cryptography in space

WithSecure’s USB armory enables post-quantum cryptography in space 01/06/2023 at 19:35 By Industry News WithSecure’s USB armory is an open-sourced, single board computer with a unique form factor and capabilities. It has been used in a variety of applications, including (but not limited to) encrypted storage solutions, hardware security modules (HSM), enhanced smart cards, electronic […]

React to this headline:

Loading spinner

WithSecure’s USB armory enables post-quantum cryptography in space Read More »

WithSecure releases Cloud Security Posture Management to identify insecure cloud configurations

WithSecure releases Cloud Security Posture Management to identify insecure cloud configurations 23/05/2023 at 15:18 By Industry News WithSecure has released Cloud Security Posture Management, a new module for its WithSecure Elements security platform, that identifies insecure cloud configurations attackers use to compromise networks. It’s now become commonplace for organizations to incorporate cloud-based infrastructure-as-a-service (IaaS) offerings

React to this headline:

Loading spinner

WithSecure releases Cloud Security Posture Management to identify insecure cloud configurations Read More »

Prevent attackers from using legitimate tools against you

Prevent attackers from using legitimate tools against you 10/05/2023 at 07:21 By Help Net Security Malicious actors are increasingly exploiting legitimate tools to accomplish their goals, which include disabling security measures, lateral movement, and transferring files. Using commonly available tools allows attackers to evade detection. While custom-built tools or malware can be flagged as malicious

React to this headline:

Loading spinner

Prevent attackers from using legitimate tools against you Read More »

Scroll to Top