Why quantum computing threatens security as we know it [Q&A]


Much of our current IT infrastructure relies on DNS to safely route traffic. Securing that infrastructure is in turn heavily reliant on cryptography, but there's a threat looming on the horizon.
Quantum computing will offer a level of processing power that could render current cryptographic techniques obsolete, and that's a problem for the entire internet and networking world. We spoke to Peter Lowe, principal security researcher at DNSFilter, to discuss the possible impact of quantum computing on security and what can be done to address the threat.
New solution secures encrypted data for a post-quantum world


The advent of quantum computing offers a serious threat to the safety of encrypted information. But current post-quantum cybersecurity (PQC) solutions either can't reach edge devices like laptops and mobile phones or required software installation on these devices which is cumbersome and hard to manage.
Now though QuSecure is launching a new solution for protecting encrypted private data on any website or mobile application with quantum-resilient connections and sessions, all with no end-user installation required.
A hybrid approach and risks to security -- quantum computing predictions for 2023


Quantum computing holds the promise of much faster processing speeds but is still widely viewed as still being some way in the future as a commercial proposition. It could boost machine learning and AI, and unlock the power of unstructured data.
Of course quantum also comes with security challenges thanks to its potential to crack passwords and break encryption. Here's what industry experts expect to see happening in the quantum world in 2023.
Encrypted attacks breach 70 percent of organizations


New research from Vectra AI finds 70 percent of organizations have fallen victim to an attack that used encrypted traffic to avoid detection, and 45 percent admit they've been victims more than once.
It's concerning that 66 percent say they don't have visibility into all their encrypted traffic, leaving them highly vulnerable to further encrypted attacks.
Half of IT pros believe quantum computing could put their data at risk


A new study from Deloitte shows 50.2 percent of professionals at organizations considering quantum computing benefits believe that their organizations are at risk from 'harvest now, decrypt later' (HNDL) cybersecurity attacks.
In HNDL attacks, threat actors harvest data from unsuspecting organizations, anticipating that data can be decrypted later when quantum computing gets sufficiently mature to render some existing cryptographic algorithms obsolete.
How decentralized storage can help prevent data breaches [Q&A]


According to a recent IBM report the average cost of a data breach is now $4.35 million. If enterprises don't take steps to protect personal data effectively they risk losing not just money but also the trust of their customers.
We spoke to Saswata Basu, founder and CEO of 0Chain, to discuss how decentralized storage can help to address the problem.
Evervault is offering free encryption services to women's health apps


There have been several knock-on effects from the Supreme Court ruling on Roe v Wade, but few people would have predicted a change in app use habits out of fear of criminal proceedings. But this is precisely what has happened as growing numbers of users are concerned about the potential for data stored in apps to be used against them
It's just one of the reasons there has been numerous instances of users either ditching period tracking apps altogether, or switching to options considered to be more secure. Now encryption firm Evervault has offered up another solution, announcing it will offer its encryption services free of charge to women's health apps.
Almost half of UK organizations now encrypt all their data


The increasing threat of data breaches and ransomware is leading more business to encrypt all of their data according to a new report.
The report, from hardware-encrypted USB drive maker Apricorn, is based on a study of 100 UK IT decision makers carried out by Vanson Bourne and finds 47 percent now require the encryption of all data both at rest and in transit.
Kingston releases hardware-encrypted IronKey Vault Privacy 50 USB flash drive


We recently told you about the Kingston VP80ES IronKey Vault Privacy 80 -- a speedy portable SSD that features USB-C connectivity and a touchscreen for tapping-in a password or pin. While that drive is quite amazing, not everyone will truly need the fast speeds or touchscreen -- it could be overkill. Instead, a hardware-encrypted USB flash drive could be sufficient -- and much less expensive.
Today, Kingston launches its latest hardware-encrypted flash drive. Called "IronKey Vault Privacy 50 (VP50)," the drive uses a USB-A connector and is offered in capacities ranging from 8GB to 256GB. The VP50 features XTS-AES 256-bit encryption and is FIPS 197 certified.
The role of encrypted traffic analysis for threat detection [Q&A]


Everyone is striving to make their systems more secure and in many cases that means adopting encryption in order to protect data.
But the use of encrypted traffic over networks presents a headache for security teams as malicious content can be harder to detect. We spoke to Thomas Pore, director of security products at Live Action, to find out more about the problem and how it can be addressed.
Kingston VP80ES IronKey Vault Privacy 80 is an encrypted USB-C SSD with touchscreen


Solid state drives don't just make wonderful internal boot drives for computers -- they're excellent for external storage too. Not only are they smaller than mechanical hard disk drives, but they use less power and are much faster as well. Quite frankly, if you are someone that needs to transport data on a portable drive, you'd be insane to still use a HDD with moving parts.
But what if you lose that external solid state drive? Well, if the content is unencrypted, your files could be exposed to the finder. This is particularly problematic for business users that are storing company secrets or private customer data. Thankfully, a new USB-C solid state drive from Kingston makes it super easy to encrypt and decrypt your data. You see, the VP80ES IronKey Vault Privacy 80 is a hardware-encrypted (FIPS 197 certified with XTS-AES 256-bit) SSD with a color touchscreen that allows you to enter a passcode, password, pin, or phrase.
New solution aims to address quantum security threats


We all know that quantum computing is going to offer a major boost in computing power. But that power also represents a threat to cryptographic systems, potentially putting the world's data at risk.
To address the issue QuSecure is launching an industry first end-to-end post-quantum cybersecurity (PQC) software-based solution designed to protect encrypted communications and data with quantum-resilience.
Enterprises poorly protected against third-party risks


A new report from compliance and risk management firm Kiteworks shows 51 percent of organizations are inadequately protected against third-party security and compliance risks related to sensitive content communications.
It also reveals that most organizations share sensitive content with a long list of third-party entities. Two-thirds do so with more than 1,000 third parties, while one-third have over 2,500.
Why PKI still has a key role in security [Q&A]


The origins of Public Key Infrastructure (PKI) date back to the 1970s and research at UK intelligence agency GCHQ, though it didn't emerge from the secret world and take off commercially until the 1990s.
PKI still underlies a great deal of modern cryptography, so we spoke to Ryan Sanders, senior product marketing manager at Keyfactor, to find out more about it and why it isn’t going away any time soon.
The internet is getting safer but legacy encryption techniques still linger


A new report from Venafi, based on in-depth security analysis of the world's top million websites over the last 18 months, shows the internet is becoming more secure.
Use of encryption is increasing and the adoption of newer TLS protocols is rising. However, many companies continue to use legacy RSA encryption algorithms to generate keys, despite stronger protocols being available.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.