Cybersecurity in the second Trump term: What security leaders need to know
The Trump administration hasn't said much yet about cybersecurity, but three Biden executive orders that were left standing indicate what its policies may be.
Cisco’s Vision for Post-Quantum Cryptography: A Secure Future
Quantum computing threatens traditional encryption, and attackers are already preparing. With new NIST standards, the urgency to adopt quantum-resistant cryptography is clear. Cisco leads the transition with secure migration, risk assessments, and...
Óvakodjon a deepfake-től: a megtévesztések új korszaka– SANS OUCH! – 2025. március
Megjelent a SANS és a Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet közös kiadványának 2025. márciusi száma, melyben a deepfake-kel foglalkozunk. Bemutatjuk a három fő típust, valamint azt is, hogyan lehet felismerni a deepfake...
CISA Adds Five Known Exploited Vulnerabilities to Catalog
CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-20118 Cisco Small Business RV Series Routers Command Injection Vulnerability CVE-2022-43939 Hitachi Vantara...