Know Your Vulnerabilities: Key Exchange in Danger

Know Your Vulnerabilities: Key Exchange in Danger

The quantum threat is around the corner. You already know that Post-Quantum Cryptography (PQC) is a cost-effective and practical solution. However, modern data communication cryptosystems used in network protocols like SSH and TLS are complicated and typically consist...
6 IT security predictions for 2023

6 IT security predictions for 2023

As I do each year, I recently got together with a number of my very talented colleagues at Quest to think about key trends and lay out our IT predictions for the coming year. Since we specialize in Active Directory and cyber resilience, we were particularly interested...
2022: A year of phishing with a solution to calm the seas

2022: A year of phishing with a solution to calm the seas

In 2022, phishing scams continued to hook into consumers and enterprise accounts. In fact, recent research from EMA revealed that 87% of surveyed businesses indicate that their organization experienced an identity-related security breach in the preceding 12 months....