Quantum computing, the use of quantum phenomena such as superposition and entanglement to perform computation, is expected to impact many sectors, including healthcare, energy, finance, entertainment, and security.
Before this large-scale impact is achieved, several challenges need to be overcome, and security leaders should start preparing for this change, says Sergey Strakhov, Chief Technology Officer at IronCap. Here, we talk to Strakhov about the impact quantum computing will have on security and the potential risks it poses.
As the global pandemic forces more people to work remotely than ever before, it’s important to take steps to protect both your personal and company data from online threats.
Jaguar Racing announced that it has partnered with enterprise software provider Micro Focus, ahead of season seven of the ABB FIA Formula E World Championship. Initially, Micro Focus will provide technology to deliver high-performance advanced analytics and machine learning to ensure the Jaguar team performs at top speed for winning results. Micro Focus will also conduct a cyber resilience assessment workshop to help the team identify any potential risks and gaps in their cybersecurity posture.
As cybercriminals continue to revel in the surge of employees using weak or vulnerable methods to remotely access workplace systems, organizations are increasingly looking to boost overall security by eliminating passwords, and instead opting for passwordless authentication. Here, we talk to Shimrit Tzur-David, CTO of Secret Double Octopus, about recent developments in this technology.
Erik Antons, Chief Security Officer of Whirlpool Corporation gives Security his first-hand account of his inspired career in security, including navigating a layoff and coming out on the other side.
Indeed, over the past few years, ransomware operators have shifted tactics, moving from widespread targeting intended to collect smaller ransoms from several entities to being more selective in what organizations are targeted and setting larger ransom amounts. One recent tactic revealed ransomware operators using virtual machine to evade detection, which was quickly adopted by other groups.
The IoT security bill is a step in the right direction, as it addresses one of the biggest gaps in software security overall -- generating awareness. But, as the use of connected devices continues to exponentially grow over time, we must ask ourselves: is it enough? Let’s explore.
The Cybersecurity and Infrastructure Security Agency (CISA) and AVANGRID, a sustainable energy company providing services in 24 states, conducted a virtual tabletop exercise to test and identify the safety procedures AVANGRID has implemented since the beginning of the COVID-19 pandemic and identify additional procedures necessary to ensure employee safety operations and business continuity in the out years.