article thumbnail

Today’s CISO Insights – How to Tackle the Quantum Threat

CyberSecurity Insiders

Due to this specific way of processing, quantum computers can also break many of the current encryption algorithms used to protect data. This is why CISOs everywhere should be concerned. Most likely his data is protected using current encryption algorithms and keys. It is safe, encrypted, and should take forever to decrypt.”

CISO 133
article thumbnail

Spike in encrypted malware poses dual challenge for CISOs

CSO Magazine

Without proper inspection, encrypted data can be a significant security threat as the volume of malware in encrypted traffic grows. That’s the takeaway from two sets of new research into the threat malware hidden in encrypted traffic poses to organizations. To read this article in full, please click here (Insider Story)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 2/23/24

Security Boulevard

Insight #1 The post quantum encryption era is upon us, and Apple is leading the charge to protect against future quantum computing attacks by boosting security on its iMessage platform , adding a new form of message encryption on top of its existing encryption tools.

CISO 52
article thumbnail

CISO Stories Podcast: NotPetya – 45 Minutes and 10,000 Servers Encrypted

Security Boulevard

The post CISO Stories Podcast: NotPetya – 45 Minutes and 10,000 Servers Encrypted appeared first on Security Boulevard. Learn how to prepare and reduce the risk of the next ransomware event as Todd Inskeep, Founder at Incovate Solutions, walks us through the lessons learned after managing out of a NotPetya ransomware attack.

CISO 57
article thumbnail

Quantum Resistant Encryption – Are You Ready?

Thales Cloud Protection & Licensing

Quantum Resistant Encryption – Are You Ready? When functional quantum computing becomes available it is anticipated to make many current asymmetric encryption ciphers (RSA, Diffie-Hellman, ECC etc.) Learn more about Thales solutions for quantum resistant encryption. Encryption. Tue, 11/02/2021 - 09:10. .

article thumbnail

Security leaders chart new post-CISO career paths

CSO Magazine

Mike Engle started on the CISO career track early in his career, moving up to senior vice president of information and corporate security at Lehman Brothers in the early 2000s Engle says he thought the professional path was a good fit, explaining that he found security technologies, such as encryption, fascinating and the cat-and-mouse aspects of the (..)

CISO 112
article thumbnail

Security Scope and the Threat Continuum. What CISOs Need to Know.

Security Boulevard

Netography is architected to quickly replace the network-based security capabilities that atomization and encryption have eroded. What CISOs Need to Know. What CISOs Need to Know. And we can do it with a broader scope for more extensive coverage of the threat continuum. The post Security Scope and the Threat Continuum.

CISO 67