Remove Authentication Remove Encryption Remove Risk Remove Whitepaper
article thumbnail

Post-Quantum Cryptography: Lessons Learned from SHA-1 Deprecation

Security Boulevard

For businesses still using the broken SHA-1, they were facing serious risks , including: Increased possibility of a collision or man-in-the-middle attack. Challenges toward post-quantum cryptography: confidentiality and authentication. NIST has developed a whitepaper which outlines the steps for migration to post-quantum cryptography.

article thumbnail

LRQA Nettitude’s Approach to Artificial Intelligence

LRQA Nettitude Labs

There are currently conflicting or uncoordinated requirements from regulators which creates unnecessary burdens and that regulatory gaps may leave risks unmitigated, harming public trust and slowing AI adoption. Current Regulations Initial investigation shows the challenges that organisations will face in regulating the use of AI.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protecting Medical Data Against a Cyber-Attack Pandemic

Thales Cloud Protection & Licensing

Today, there is a need to protect the authenticity of individual vaccination records. This research needs to be secure; if malicious actors were able to access it, they could change crucial details that could put untold numbers of people at risk. Authenticate every medical IoT device. Encryption. Data security.

article thumbnail

Protecting Medical Data Against a Cyber-Attack Pandemic

Thales Cloud Protection & Licensing

Today, there is a need to protect the authenticity of individual vaccination records. This research needs to be secure; if malicious actors were able to access it, they could change crucial details that could put untold numbers of people at risk. Authenticate every medical IoT device. Encryption. Data security.

article thumbnail

Six existential threats posed by the future of 5G (Part One)

CyberSecurity Insiders

Below, we explore these risk factors in depth and determine what can be done to mitigate the threat moving forward. This move to the virtual brings a variety of new security risks including, danger of cross-contamination, data leakage and the spread of malware – all of which we can bet malicious actors will be waiting to take advantage of.

IoT 101
article thumbnail

Six existential threats posed by the future of 5G (Part Two)

CyberSecurity Insiders

Here, we take a deeper look into another three high-risk areas telecoms companies need to address as 5G technology progresses and more people begin to use the network. For more information on building a 5G world we can all trust, see our whitepaper here , or tweet us @ThalesDigiSec with your questions.

Mobile 101
article thumbnail

Cybersecurity Awareness Month Blog Series: Using Technology to Safeguard the Nation’s Critical Infrastructure

Thales Cloud Protection & Licensing

CDM will provide these agencies with tools that: Identify cybersecurity risks on an ongoing basis; Prioritize these risks based upon potential impacts; and, Enable cybersecurity personnel to mitigate the most significant problems first. The Vormetric Data Security Platform.