
As part of the first Patch Tuesday of 2020, Microsoft has released patches for CVE-2020-0601. This is a critical flaw…

NIST invites comments on Draft NIST Special Publication (SP) 800-208, Recommendation for Stateful Hash-Based Signature Schemes. All of the digital…






NIST has released the following Draft NIST Special Publications (the SP 800-140x “subseries”) for public comment. They directly support Federal…


Playbook for defenders covers attack tools and techniques used by 11 major ransomware families including WannaCry, SamSam, RobbinHood, Ryuk, MegaCortex,…


ESET has released a new product – ESET Full Disk Encryption (EFDE), designed to protect unauthorised access to a business’s…


End-to-end off device encryption service Cryptix is now available as a HP Workpath application Datasec Solutions, a Melbourne-based cybersecurity business, has…






NIST invites comments on Draft Special Publication (SP) 800-57 Part 1 Revision 5, Recommendation for Key Management: Part 1 – General. This…






NIST announces the publication of NIST Internal Report (IR) 8268, Status Report on the First Round of the NIST Lightweight…






NIST Releases Special Publication 800-52 Rev. 2 NIST has released a Special Publication (SP) 800-52 Revision 2, Guidelines for the Selection,…


In what is claimed as a world first, three cybersecurity companies Vault Cloud, QuintessenceLabs and Ziroh Labs have announced the…