Quantum computing has been evolving for decades and holds immense promise. Companies have invested billions of dollars in this technology, which will eventually solve complex business problems. But for now the use cases are limited, said Kawin Boonyapredee, chief strategy officer at Applied Quantum.
The United States is preparing for an age of quantum computing as federal agencies roll out initiatives designed to boost "quantum readiness" and as experts warn the government may face issues that delay its ability to defend against a future of advanced threats enabled by the emerging technology.
An international law enforcement operation dismantled the Ghost encrypted messaging service in a takedown that resulted in the arrest of 51 suspects across three continents including alleged members of the Italian Mafia and motorcycle gangs. Australian police arrested Ghost's alleged administrator.
In the latest weekly update, ISMG editors discussed the implications of the recent arrest of Telegram's CEO in Paris for encrypted messaging services, the transformative impact of artificial intelligence in cybersecurity, and the latest regulations designed to curb fraud in electronic payments.
The arrest and indictment of Telegram CEO Pavel Durov is sparking concerns about the viability of encrypted communications in France. The Paris Prosecutor's Office indicted Durov, the 39-year-old Russian-born owner of Telegram on Wednesday, after arresting him Saturday night.
The Saturday evening arrest of Telegram CEO Pavel Durov by French law enforcement agencies thrust the already controversial social media platform further into the international spotlight as Paris authorities said the Russian billionaire will likely remain in custody at least through Wednesday.
The National Institute of Standards and Technology, a global trendsetter for cryptographic standards, announced the publication of a post-quantum standard for general encryption and two digital signature standards. The agency solicited proposals in December 2016 and selected the algorithms in 2022.
Encrypted messaging apps continue to stymie a federal probe into the smartphone of the shooter who attempted to assassinate former President Donald Trump, FBI Deputy Director Paul Abbate testified Tuesday. Law enforcement has long voiced its frustration over unbreakable end-to-end encryption.
A federal investigation into an assassination attempt on Republican presidential nominee Donald Trump encountered "significant technical challenges" due to the shooter's use of encrypted devices and platforms, FBI Director Christopher Wray said Wednesday.
A proposal requiring online chat providers to scan images and links for child pornography failed to garner majority support Thursday from European Union trading bloc governments. The bill would require chat app users to consent to having images and URLs scanned for child sexual abuse material.
Following a legal intervention made by the German federal cybersecurity agency, Microsoft has disclosed additional information on encryption measures it adopted to secure its customer data. A new white paper details how the company is deploying double key encryption.
The way we’ve been taught to deploy identity and access management is perfectly suited – for a world that no longer exists. Today, Zero Trust requires that security and IT teams verify every identity, secure every sign in, and ensure the health of every device. Yet traditional IAM tools can only secure a fraction...
The annual Cryptographer's Panel at RSA Conference gathers leading cybersecurity thinkers to review and debate the big topics of the day. Topics on tap this year included a recent threat to post-quantum cryptography and all things artificial intelligence.
With the potential to break existing encryption standards, quantum computing poses an exponential threat to cybersecurity. Marc Witteman, CEO, Riscure, discusses the need to accelerate development and deployment of new cryptography standards as well as challenges around their widespread adoption.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.