Remove 2008 Remove Digital transformation Remove IoT
article thumbnail

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

The Last Watchdog

And the risk factors will only rise exponentially as reliance on cloud infrastructure and Internet of Things (IoT) systems accelerates. It wasn’t until 2008, after decades of theorizing, that an IBM researcher name Craig Gentry came up with a viable mathematical solution to do this. Basic research like this is so vital.

Software 182
article thumbnail

How to Prepare for the Future of Healthcare Digital Security

Thales Cloud Protection & Licensing

Healthcare’s IT evolution has brought numerous security challenges including regulations, the use of digitally transformative technologies that have created huge amounts of data to store and protect, and the extraordinary value of electronic personal health information (ePHI) to cybercriminals. Almost all (96%) of U.S.

article thumbnail

The Hacker Mind Podcast: The Fog of Cyber War

ForAllSecure

Like in 2008, when I presented with Chris Boyd from the UK, on the rise of teenage hackers. Russia has been actively using disinformation to wage an information war against Ukraine but now Ukraine is fighting back with the digital Minister Mikhail Obrador leading the front by using social media to rally international support against Russia.