article thumbnail

Today’s CISO Insights – How to Tackle the Quantum Threat

CyberSecurity Insiders

As you may have noticed, daily headlines around quantum computing and its impact on technologies are becoming commonplace. Due to this specific way of processing, quantum computers can also break many of the current encryption algorithms used to protect data. This is why CISOs everywhere should be concerned.

CISO 133
article thumbnail

Security leaders chart new post-CISO career paths

CSO Magazine

Mike Engle started on the CISO career track early in his career, moving up to senior vice president of information and corporate security at Lehman Brothers in the early 2000s Engle says he thought the professional path was a good fit, explaining that he found security technologies, such as encryption, fascinating and the cat-and-mouse aspects of the (..)

CISO 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Quantum Resistant Encryption – Are You Ready?

Thales Cloud Protection & Licensing

Quantum Resistant Encryption – Are You Ready? When functional quantum computing becomes available it is anticipated to make many current asymmetric encryption ciphers (RSA, Diffie-Hellman, ECC etc.) Learn more about Thales solutions for quantum resistant encryption. Encryption. Tue, 11/02/2021 - 09:10. .

article thumbnail

Intel, DoD start sprint to make homomorphic encryption ready for real

SC Magazine

Intel Labs announced an initiative funded by the Defense Advanced Research Projects Agency to create hardware that accelerates how computers process homomorphic encryption. If successful, it could thwart the hurdle that keeps the pervasive privacy and security technology out of general use. Photo by Justin Sullivan/Getty Images).

article thumbnail

MY TAKE: Fostering Digital Trust – the role of ‘post-quantum crypto’ and ‘crypto agility’ in 2024

The Last Watchdog

I had the opportunity to sit down with DigiCert’s Jason Sabin , Chief Technology Officer and Avesta Hojjati , Vice President of Engineering to chew this over. And PKI is the best technology we’ve got to get us there. We met at DigiCert Trust Summit 2023. Threat actors are pursuing a “harvest now, decrypt later” strategy, Savin told me.

article thumbnail

Stop betting on detection-based security technology

SC Magazine

Today’s columnist, Aviv Grafi of Votiro, says companies need stronger, more proactive tools, and must give CISOs a seat at the table –or else we’ll have more major attacks like the ones on SolarWinds, Microsoft Exchange, Colonial Pipeline, and now Kaseya. ecooper99 CreativeCommons CC BY 2.0. Guess what? They’re not.

article thumbnail

How Zero Trust helps CIOs and CTOs in Corporate Environments

CyberSecurity Insiders

Zero Trust is a cybersecurity framework that can greatly support Chief Information Security Officers (CISOs) and Chief Technology Officers (CTOs) in their roles of securing organizational systems and data. Simplified Compliance: Compliance with industry regulations and data protection laws is a significant concern for CISOs and CTOs.

CISO 116