Cyberattacks Use Office 365 to Target Supply Chain

Malicious actors have a history of trying to compromise users’ Office 365 accounts. By doing so, they can tunnel into a network and use their access to steal sensitive information. But they need not stop there. They can also single out other entities with which the target does business for…

Read More

Quantum Security and AI: Building a Future Together

Quantum computing is still cutting-edge, but that doesn’t mean it can’t be improved. What is quantum computing? Is it the same as quantum cryptography, a central tenet of so-called quantum security? And where does artificial intelligence (AI) fit in? What Is Quantum Security?  Often when you hear about quantum computing…

Read More