Remove CISO Remove Encryption Remove Risk Remove Technology
article thumbnail

Today’s CISO Insights – How to Tackle the Quantum Threat

CyberSecurity Insiders

As you may have noticed, daily headlines around quantum computing and its impact on technologies are becoming commonplace. Due to this specific way of processing, quantum computers can also break many of the current encryption algorithms used to protect data. This is why CISOs everywhere should be concerned.

CISO 133
article thumbnail

Quantum Resistant Encryption – Are You Ready?

Thales Cloud Protection & Licensing

Quantum Resistant Encryption – Are You Ready? If you take a good hard look at the risks arising from Quantum, there is bad news and good news. When functional quantum computing becomes available it is anticipated to make many current asymmetric encryption ciphers (RSA, Diffie-Hellman, ECC etc.) Encryption.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: In pursuit of smarter cybersecurity — to overcome complex risks and grow revenue

The Last Watchdog

Smarter security to me broadly refers to relentlessly focusing on fundamentals while maturing the program, making sure your risk posture aligns with your business strategy. Business initiatives demand faster, more efficient outcomes and technology responds. Complexity challenge. Managed solutions can help.

Risk 214
article thumbnail

MY TAKE: Fostering Digital Trust – the role of ‘post-quantum crypto’ and ‘crypto agility’ in 2024

The Last Watchdog

I had the opportunity to sit down with DigiCert’s Jason Sabin , Chief Technology Officer and Avesta Hojjati , Vice President of Engineering to chew this over. And PKI is the best technology we’ve got to get us there. What’s more, a fresh layer of risks posed by the rise of quantum computing looms large.

article thumbnail

Three Risk Mitigation Strategies to Address the Latest Data Security Threats

CyberSecurity Insiders

By Dannie Combs , Senior Vice President and CISO, Donnelley Financial Solutions (DFIN) As security threats to data continue to ebb and flow (mostly flow!), Here are three risk mitigation imperatives that can help organizations get a better handle on these latest risks and threats.

Risk 118
article thumbnail

How Zero Trust helps CIOs and CTOs in Corporate Environments

CyberSecurity Insiders

Zero Trust is a cybersecurity framework that can greatly support Chief Information Security Officers (CISOs) and Chief Technology Officers (CTOs) in their roles of securing organizational systems and data. This approach significantly reduces the risk of lateral movement and unauthorized access within the network.

CISO 116
article thumbnail

7 Things Every CISO Needs to Know About PKI

Security Boulevard

7 Things Every CISO Needs to Know About PKI. A public key infrastructure (PKI) is responsible for supporting public encryption keys while also enabling users and computers to safely exchange data over networks and verify the identity of other parties. Reduce risk and achieve compliance. Ensure clean, low-risk audit results.

CISO 52