Security

Quantum Computing and the Future of Cryptography – an Overview

Quantum Computing and the Future of Cryptography – an Overview

Quantum computing is a rapidly advancing research area which promises to solve various classically difficult problems, including various cryptographic schemes. Several experts predict that quantum computers will be capable of breaking currently used encryption schemes in a decade. To secure data in the post-quantum future the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has announced the first completed standards for post-quantum cryptography protocols.
This article provides an introduction to quantum computers as well as an overview of post-quantum cryptography.

Reflections on Visiting it-sa Expo&Congress

Reflections on Visiting it-sa Expo&Congress

As the threats to Information security multiply and evolve each year, our colleague Kosae wasn’t at all surprised to witness the rapid growth of the cybersecurity market at the recent it-sa. In an era where cyber attacks become more sophisticated and frequent, it’s clear that organizations are increasingly prioritizing security measures. This annual gathering showcased some of the latest advancements, strategies, and insights within the field.

Scanning a microservice architecture with Veracode Collections

Scanning a microservice architecture with Veracode Collections

Facing the escalating number of reported Common Vulnerabilities and Exposures (CVEs), Veracode offers a solution providing comprehensive tools for detection and remediation of security vulnerabilities. The article further delves into how Veracode Collections contributes to overcoming limitations in traditional scanning approaches, allowing a more efficient and customized security review of complex microservice architectures.

Open Source Tools for Software Supply Chain Security

Open Source Tools for Software Supply Chain Security

In this article we show how you can improve the security of your software supply chain without spending money for software licenses. For this, we present useful open-source tools for automated dependency updates, vulnerability scanning of dependencies, license scanning, SBOM generation, secret detection and scanning of infrastructure as code for vulnerabilities and misconfiguration.

Software Supply Chain Security with Google Software Delivery Shield

Software Supply Chain Security with Google Software Delivery Shield

Our authors Pascal and Bastian investigated the Google Software Delivery Shield which is Google’s fully managed solution for software supply chain security. In this article they describe how software supply chain security can be achieved during the different steps of the software development lifecycle with the Google Software Delivery Shield.