Most virtual servers in the Amazon Elastic Compute Cloud EC2 run a version of Linux that has been specially customised for the needs of the cloud. The latest generation of scanners from Greenbone has also been available for the Amazon Web Services operating system for a few weeks now. Over 1,900 additional, customised tests for […]
https://www.greenbone.net/wp-content/uploads/Gb_New-logo_horizontal_head.png00Markus Feilnerhttps://www.greenbone.net/wp-content/uploads/Gb_New-logo_horizontal_head.pngMarkus Feilner2024-07-11 12:38:292024-12-18 08:40:03Vulnerability scanner Notus supports Amazon Linux
Public-key cryptography underpins enterprise network security and thus, securing the confidentiality of private keys is one of the most critical IT security challenges for preventing unauthorized access and maintaining the confidentiality of data. While Quantum Safe Cryptography (QSC) has emerged as a top concern for the future, recent critical vulnerabilities like CVE-2024-3094 (CVSS 10) in […]
How is artificial intelligence (AI) changing the cybersecurity landscape? Will AI make the cyber world more secure or less secure? I was able to explore these questions at the panel discussion during the “Potsdam Conference for National Cybersecurity 2024” together with Prof. Dr. Sandra Wachter, Dr. Kim Nguyen, Dr. Sven Herpig. Does AI deliver what […]
https://www.greenbone.net/wp-content/uploads/Gb_New-logo_horizontal_head.png00Elmar Geesehttps://www.greenbone.net/wp-content/uploads/Gb_New-logo_horizontal_head.pngElmar Geese2024-06-27 14:30:252025-03-31 10:00:04AI and cybersecurity: The promise of artificial intelligence
Vulnerability scanner Notus supports Amazon Linux
BlogMost virtual servers in the Amazon Elastic Compute Cloud EC2 run a version of Linux that has been specially customised for the needs of the cloud. The latest generation of scanners from Greenbone has also been available for the Amazon Web Services operating system for a few weeks now. Over 1,900 additional, customised tests for […]
CVE-2024-31497: PuTTY Forfeits Client ECDSA Private Keys
BlogPublic-key cryptography underpins enterprise network security and thus, securing the confidentiality of private keys is one of the most critical IT security challenges for preventing unauthorized access and maintaining the confidentiality of data. While Quantum Safe Cryptography (QSC) has emerged as a top concern for the future, recent critical vulnerabilities like CVE-2024-3094 (CVSS 10) in […]
AI and cybersecurity: The promise of artificial intelligence
Blog, EventsHow is artificial intelligence (AI) changing the cybersecurity landscape? Will AI make the cyber world more secure or less secure? I was able to explore these questions at the panel discussion during the “Potsdam Conference for National Cybersecurity 2024” together with Prof. Dr. Sandra Wachter, Dr. Kim Nguyen, Dr. Sven Herpig. Does AI deliver what […]