In this blog post we summarize some of the uses to which randomness can be put in computing – and cybersecurity especially – and investigate what pitfalls can occur when randomness is inappropriately sourced, generated or supplied in support of cybersecurity functions.