Apple made a rare appearance at tech’s biggest conference and defended encryption on the iPhone – Business Insider

Apple's top privacy executive has defended the firm's use of encryption despite its recent clashes with the FBI on the issue.

According to Bloomberg's Mark Gurman, iPhone privacy chief Jane Horvath who was peaking on a panel at this year's CES tech conference in Las Vegas said that iPhones' susceptibility to being stolen means they must be encrypted to protect personal information such as financial and health data.

"Our phones are relatively small and they get lost and stolen," Horvath said, according to CNBC. "If we're going to be able to rely on our health data and finance data on our devices, we need to make sure that if you misplace that device, you're not losing your sensitive data."

It was a rare move for Apple, which normally shuns public appearances at industry conferences. At the 2019 CES, its only visible presence was a massive billboard extolling its privacy practices.

Horvath added that she doesn't support the creation of backdoors to give law enforcement easier access to encrypted phones.

The FBI has clashed with Apple on multiple occasions over access to locked iPhones. Gaston De Cardenas/Reuters

Horvath's remarks came as Apple was sent a letter by the FBI on Monday asking it to help unlock two iPhones belonging to the man suspected of carrying out last month's shooting in Pensacola, Florida, in which three people were killed.

It isn't clear yet to what extent Apple will help, and in the past the firm has refused to help officials access phones belonging to suspected criminals.

In 2015, Apple refused to help when government officials sought access to an iPhone from a terrorist who killed 14 people in San Bernardino, California, in 2015. The FBI persisted regardless, and was eventually able to hack into the device with the help of an unknown third party.

In the aftermath of the San Bernardino case, Apple CEOTim Cook said that creating a so-called "backdoor to the iPhone" was not the answer words echoed at CES by Horvath, who said that "building back doors into encryption is not the way we are going to solve those issues."

Business Insider has approached Apple for comment.

View post:
Apple made a rare appearance at tech's biggest conference and defended encryption on the iPhone - Business Insider

Encryption Software Market 2020 Size, Growth By Top Companies, Forecast Analysis To 2027 – Citi Blog News

Verified Market Research has recently published a research report titled, [Global Encryption Software Market Research Report 2020] assessing various factors impacting its trajectory. Analysts have used primary and secondary research methodologies to determine the path of the market. The data includes historic and forecast values for a well-rounded understanding. The global Encryption Software Market is expected to augment in the forecast period owing to various drivers and opportunities that lie in the ever-growing market. This report includes assessment of various drivers, government policies, technological innovations, upcoming technologies, opportunities, market risks, restrains, market barriers, challenges, trends, competitive landscape, and segments.

Global Encryption Software Market was valued at USD 3.32 billion in 2016 and is projected to reach USD 30.54 billion by 2025, growing at a CAGR of 27.96% from 2017 to 2025.

Dell, Thales E-Security, Eset, Symantec, IBM Corporation, Sophos, Ciphercloud, Pkware, Mcafee, Gemalto, Trend Micro, Microsoft Corporation

Global Encryption Software Market : Drivers and Restraints

This section of the report assess various drivers, opportunities, and restrains that lie in the market. These drivers and restraints are determined by various factors such as region, key players, innovations, and others. The report will help readers determine the key drivers and solutions for restraints. It also highlights the possible opportunities. The drivers and restraints are identified by current trends and historic milestones achieved by the market. The chapter on drivers and restraints also offers an evaluation of the investments made in production innovation through the years. The changes in environmental perspective have also been factored in to understand their impact on the growth of the global Encryption Software Market .

Analysts have also highlighted the potential restraints present in the global Encryption Software Market . With the help of market experts the report points out what changes companies can make to overcome these hurdles over the forecast years.

The research report includes segmentation of the global Encryption Software Market on the basis of application, technology, end users, and region. Each segment gives a microscopic view of the market. It delves deeper into the changing political scenario and the environmental concerns that are likely to shape the future of the market. Furthermore, the segment includes graphs to give the readers a birds eye view.

Last but not the least, the research report on global Encryption Software Market profiles some of the leading companies. It mentions their strategic initiatives and provides a brief about their structure. Analysts have also mentioned the research and development statuses of these companies and their provided complete information about their existing products and the ones in the pipeline.

Based on regions, the market is classified into North America, Europe, Asia Pacific, Middle East & Africa and Latin America. The study will provide detailed qualitative and quantitative information on the above mentioned segments for every region and country covered under the scope of the study.

Advanced analytical research solutions within one platform; Verified Market Research. Offering information enriched research studies that include primary and secondary research studies. Verified Market Research assists in understanding holistic industrial factors and trends.

Analysts with high expertise in data gathering and governance utilize industry techniques to collate and examine data at all stages. Our analysts are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research reports.

Continued here:
Encryption Software Market 2020 Size, Growth By Top Companies, Forecast Analysis To 2027 - Citi Blog News

WidePoint Partners with KoolSpan to Offer End-to-End Encryption for Phone Calls and Text Messages – GlobeNewswire

FAIRFAX, Va. and BETHESDA, Md., Jan. 08, 2020 (GLOBE NEWSWIRE) -- WidePoint Corporation (NYSE American: WYY), the leading provider of Trusted Mobility Management (TM2) specializing in Telecommunications Lifecycle Management, Identity Management and Digital Billing & Analytics solutions and KoolSpan, the provider of TrustCall, have entered into a partnership through which WidePoint delivers KoolSpans cross-platform, end-to-end communication solution to WidePoint customers so that they can make phone calls and send text messages securely.

WidePoint has partnered with KoolSpan to resell TrustCall, the leading secure mobile communications platform to governments and enterprises globally that secures phone calls and messages with end-to-end encryption. TrustCall is an enterprise-grade solution that delivers high performance and HD quality encrypted audio and can be flexibly deployed via the cloud, on premise, or in hybrid form.

KoolSpans TrustCall ensures that devices use end-to-end encryption for all communication paths, which is crucial to improving the security of global telecommunications networks, said Jin Kang, WidePoint President and Chief Executive Officer. By partnering with KoolSpan, we have immediately added a secure communication tool that is directly complementary to our product suite and a critical need for our federal and enterprise clients. We expect this partnership to give us an additional leg up over our competition as we continue to focus on expanding our presence as a leading provider of trusted mobility management services.

Nigel Jones, KoolSpans Chief Executive Officer, stated: WidePoint has a long history of successfully serving both federal agencies and enterprise clients, and by partnering with them, were able to leverage their reputation and relationships to serve a much broader customer base.

Global telecommunications networks are inherently insecure as has been well documented by cyber security experts in the U.S. Government and across the private sector. The threats, from surveillance of communications to theft of IP to corporate espionage, are posed by systemic vulnerabilities in the global telecommunications infrastructure that readily enable interception and monitoring of mobile communications, both voice and data, said Elad Yoran, KoolSpan Executive Chairman. The only viable solution to this problem is to use end-to-end (E2E) encryption for all communications. KoolSpan is excited to partner with WidePoint to provide TrustCall.

About WidePointWidePoint Corporation (NYSE American: WYY) is a leading provider of trusted mobility management (TM2) solutions, including telecom management, mobile management, identity management, and digital billing and analytics. For more information, visit widepoint.com.

About KoolSpanKoolSpan is a leading provider of robust, cross-platform, end-to-end communication security on smartphones globally. KoolSpan TrustCall delivers strong end-to-end (E2E) encryption for calls, text/chats on Android and iPhone devices. Customers include governments and enterprises in 60+ countries. TrustCall is FIPS 140-2 validated and has 33 issued patents with dozens pending. KoolSpan is privately held and based in Bethesda, Maryland. For more information, visitwww.koolspan.com.

Investor Relations:Gateway Investor RelationsMatt Glover or Charlie Schumacher949-574-3860, WYY@gatewayir.com

Continued here:
WidePoint Partners with KoolSpan to Offer End-to-End Encryption for Phone Calls and Text Messages - GlobeNewswire

Data Encryption Software Market Size by Top Leading Key Players, Growth Opportunities, Incremental Revenue , Trends, Outlook and Forecasts to 2025 -…

The GlobalData Encryption Software Market2020 report implement in-depth research of the industry with a focus on the current market trends future prospects. The GlobalData Encryption Software Marketreport aims to provide an overview ofData Encryption Software Marketplayers with detailed market segmentation by product, application and geographical region. It also provides market share and size, revenue forecast, growth opportunity. The most recent trending report WorldwideData Encryption Software MarketEconomy by Manufacturers, Regions, kind and application, forecast to 2025 provided byReports and Reportsis an educational study covering the marketplace with detailed analysis.

Data Encryption Software Market analysis and forecast report says that it is all set to exhibit a growth by the end of 2025, at a convincing CAGR from 2018-2025. The report portrays the present condition and the growth prospects of the global Data Encryption Software Market. To derive the future market size and status, the report studies historical data of sales volume and revenue from 2018. Analyzed based on the market segments such as key market players, regions, product type and application, this research report proves to be a comprehensive guideline for every vertical of the Data Encryption Software Market industry.

GetFree Sample Copy of Data Encryption Software Market:https://www.reportsnreports.com/contacts/requestsample.aspx?name=2806439

The GlobalData Encryption Software MarketReport provides database which pertains to the current and contemporary discovery and the new technology which has been induced in theData Encryption Software Market, thereby helping the investors to understand the impact of these on the market future development. Also, the Report comprises of an extensive study on the GlobalData Encryption Software Marketstatus, future forecast, growth opportunity, proportion, demand, key market and key players which helps the retailers and participants to be aware of the shortcomings, market threats and the plausible profitable opportunities which market can offer. Furthermore, the inculcation of industrys size, revenue, consumption helps in educating oneself of the political situations and hence, on the basis of that, one can control over a large number of the market share.

Other than the aforementioned parameters whichData Encryption Software Marketreport focuses on, another imperative objective of the report is to present theData Encryption Software Marketdevelopment across the globe especially in North America, Europe, China, Japan, Southeast Asia, India and Central and South America. In the report, the market has been categorized into manufacturers, type, application and regions.

Description

Scope of the Report:The global Data Encryption Software market is valued at xx million USD in 2018 and is expected to reach xx million USD by the end of 2024, growing at a CAGR of xx% between 2019 and 2024.The Asia-Pacific will occupy for more market share in following years, especially in China, also fast growing India and Southeast Asia regions.North America, especially The United States, will still play an important role which cannot be ignored. Any changes from United States might affect the development trend of Data Encryption Software.Europe also play important roles in global market, with market size of xx million USD in 2019 and will be xx million USD in 2024, with a CAGR of xx%.This report studies the Data Encryption Software market status and outlook of Global and major regions, from angles of players, countries, product types and end industries; this report analyzes the top players in global market, and splits the Data Encryption Software market by product type and applications/end industries.

Market Segment by Companies, this report coversDellSophosIBMEsetPkwareGemaltoThales E-SecurityMicrosoftMcafeeSymantecTrend MicroCryptomathicStormshield

Market Segment by Regions, regional analysis coversNorth America (United States, Canada and Mexico)Europe (Germany, France, UK, Russia and Italy)Asia-Pacific (China, Japan, Korea, India and Southeast Asia)South America (Brazil, Argentina, Colombia)Middle East and Africa (Saudi Arabia, UAE, Egypt, Nigeria and South Africa)

Market Segment by Type, coversOn-premisesCloud

Market Segment by Applications, can be divided intoDisk encryptionFile/folder encryptionDatabase encryptionCommunication encryptionCloud encryption

Enquire on Data Encryption Software Market:https://www.reportsnreports.com/contacts/discount.aspx?name=2806439

The regional classification considered for Data Encryption Software Market industry report are North America (U.S., Canada, Mexico, etc.), Asia Pacific (China, Japan, Korea, India, South East Asia etc.), Europe (Germany, UK, France, Italy, Russia, etc.) South America (Brazil, Argentina, Colombia), and Middle East and Africa (Saudi Arabia, UAE, Egypt, Nigeria and South Africa). This report forecasts that Asia-Pacific will occupy more market share in coming years. However, North America, especially The United States, will contribute a major role in market growth followed by Europe with an estimated growth with effective CAGR till 2025.

This report studies the Data Encryption Software Marketstatus and outlook of Global and major regions, from angles of players, countries, product types and end industries; this report analyzes the top players in global market, and splits the Data Encryption Software Marketby product type and applications/end industries.

These details further contain a basic summary of the company, merchant profile, and the product range of the company in question. The report analyzes data regarding the proceeds accrued, product sales, gross margins, price patterns, and news updates relating to the company.

Through this report, the industrial stakeholders will get an insight of the competitive environment of the major manufacturers, the demand of the product type and their application verticals. It will also help in analyzing the future growth opportunities of Data Encryption Software Market industry.

About Us: ReportsnReports.com is your single source for all market research needs. Our database includes 500,000+ market research reports from over 95 leading global publishers & in-depth market research studies of over 5000 micro markets.

We provide 24/7 online and offline support to our customers.

E-mail: [emailprotected]

Phone: +1 888 391 5441

Originally posted here:
Data Encryption Software Market Size by Top Leading Key Players, Growth Opportunities, Incremental Revenue , Trends, Outlook and Forecasts to 2025 -...

Cloud Encryption Market to Exhibit 21.5% CAGR from 2017 to 2025 – Expert Recorder

According to theglobal cloud encryption marketis highly consolidated. A few key players who are well established are holding key market shares. Names of the leading players operating in the cloud encryption market are: Thales e-Security Inc., Sophos Group Plc., CipherCloud Inc., IBM Corporation, Secomba GmbH, Gemalto NV, Hytrust Inc., Symantec Corporation, and Netskope Inc. Key players are indulging in technological innovations to strengthen their foothold and eliminate competition. Companies such as SonicWall Inc have released a range of advanced cloud security products in 2017 including SonicWall Cloud Analytics application for deep security data analysis and automated breach detection. Players are also looking to tap on the markets in emerging nations of Asia Pacific as these nations are rapidly adopting cloud solutions.

As per estimates of the TMR report, the global cloud encryption market will be worth US$2,912.3 mn by the end of 2025. The market is expected to showcase an outstanding CAGR of 21.5% between 2017 and 2025. On the basis of service model, the infrastructure as a service (IaaS) segment is expected to lead in the market on account of its various benefits over other service model components. By end user, the Telecom and IT segment are expected to be leading among the key industry verticals. On the basis of geography, North America has been leading in the market for cloud encryption.

Looking for exclusive market insights from business experts? Request Brochure

Security to Remain Primary Factor for Adoption of Cloud Encryption

According to the report, the dire need to encrypt data before it is transferred for storing in the cloud is the primary factor behind the growth of the global cloud encryption market. The rise in the penetration of cloud encryption Solutions is also due to the high demand for security capabilities for cloud storage. The rising adoption of advanced data storage technology and data storage architecture small and medium Enterprises will also fuel the demand for Cloud encryption solutions. This particular Trend regarding the adoption of advanced data storage technology and data storage architecture by small and medium Enterprises is particularly true for emerging Nations such as India, China, and Japan on account of the growing adoption of software-as-a-service distribution model. SMEs are increasingly shifting to Cloud from in-house data centers. This is because of the various applications which help in the saving and managing cost of their data centers. This in turn is expected to bolster the demand for cloud encryption.

Increased Adoption of Infrastructure-as-a-service and Software-as-a-service Model Driving Market

The growing adoption of infrastructure-as-a-service model as well as software-as-a-service model in developed nations are having a positive bearing on the cloud interruption market. The developing nations are also benefiting from the early adoption of bring your own device practices. In addition to this advancements in cloud technology in developed nations as well as the demand for private and confidential data will drive the growth of the global cloud encryption solutions market. The growing complexities of it systems and capability to deploy new applications with booster cloud encryption market in developing nations such as india and china. In particular, healthcare and BFSI sectors display substantial demand for cloud encryption solutions due to the growing complexity of IT systems.

Read more here:
Cloud Encryption Market to Exhibit 21.5% CAGR from 2017 to 2025 - Expert Recorder

Encryption Software Market to cross USD 20 Bn by 2026: Global Market Insights, Inc. – Yahoo Finance

The email encryption software market segment is expected to cover more than 25% industry share in 2026 due to the rising uptake of security software to protect data from malware, identity thefts and phishing.

Selbyville, Delaware, Jan. 08, 2020 (GLOBE NEWSWIRE) --

Global Market Insights, Inc. has recently added a new report on encryption software market which estimates the global market valuation for encryption software will cross US$ 20 billion by 2026. The industry growth is attributed to supportive government initiatives to combat cybercrimes and the rising instances of data breaches globally. The growing implementation of disk, email, and mobile encryption capabilities in security suites provided by the cybersecurity vendors to address the evolving threats will augment market growth.

The email encryption software market is expected to hold a share of over 25% in 2026 due to the rising uptake of security software to protect data from malware, identity thefts, and phishing. As email is one of the widely used communication methods used by enterprises, the demand for email data protection software to secure various aspects of email systems including content, media attachments or email access increases. The software encrypts data in transit and at rest and also supports multi-factor authentication for additional security, ensuring that sensitive information is always protected in line with regulatory compliance.

Request for a sample of this research report @ https://www.gminsights.com/request-sample/detail/4484

The on-premise deployment model segment held over 70% of the market share in 2019 and is projected to maintain a dominant position over the forecast timeline. The enterprises prefer an on-premise deployment model approach due to the high security associated with managing sensitive data in-house and gain access to cryptography keys for enhanced security. However, with the growing popularity of cloud platforms to store enterprise data due to high scalability and cost benefits, the demand for cloud-based encryption software is expected to accelerate over the forecast timeline.

The retail sector will also observe the heavy uptake of encryption over the projected timeframe owing to the need to protect customer data throughout a retailers operations. The sector is witnessing a huge usage of third-party services to support online transactions, optimizing customer experience on their websites. This has led to a rise in the number of data breaches, exploiting sensitive customer information such as credit card & bank account details and personal credentials. According to a report published by Thales eSecurity, a cybersecurity provider, around 75% of the U.S. retailers have experienced a breach in 2018 as compared to 52% in 2017, exceeding the global average. The demand for cybersecurity solutions will rise significantly from 2020 to 2026, preventing theft & customer information compromise.

Browse key industry insights spread across 260 pages with 269 market data tables and 26 figures & charts from the report, Encryption Software Market Size, By Component (Software [Endpoint Encryption, Email Encryption, Cloud Encryption], Service [Training & Consulting, Integration & Maintenance, Managed Service]), By Deployment Model (On-Premise, Cloud), By Application (IT & Telecom, BFSI, Healthcare, Retail, Government & Public Sector, Manufacturing), Industry Analysis Report, Regional Outlook, Growth Potential, Competitive Market Share & Forecast, 2020 2026 in detail along with the table of contents:

https://www.gminsights.com/industry-analysis/encryption-software-market

Latin America encryption software market is expected to grow at a CAGR of over 18% from 2020 to 2026 due to the rising number of cyberattacks on the business-critical infrastructure, growing usage of digital platforms among enterprises to conduct business transactions, and supportive government initiatives to promote cybersecurity. The rapidly evolving threat landscape has compelled public & private enterprises to promote digital security to safeguard sensitive business information. The government agencies in the countries including Mexico, Brazil, and Argentina are introducing cybersecurity strategies to respond to a wide array of cyberattacks.

Story continues

Some major findings of the encryption software market report include:

The competition in the encryption software market is characterized by strategic partnerships, new product launches, and geographic expansion. For instance, in November 2019, Sophos partnered with Telefonica UK (O2) to provide its products & services to Telefonicas customers in the UK. The partnership enables the customers to gain access to Sophos Central cloud-based security platform to secure their organizations. The companys products & services also enable customers to minimize cybersecurity risks by using behavioral analytics and machine learning to identify known & unknown threats. In August 2018, Kapalya, a Hawaii-based cybersecurity startup, introduced a data protection solution to secure data at rest and data in transit on private & public clouds and mobiles. The platform allows users to work on any device, ensuring end-to-end encrypted file sharing.

Make an inquiry for purchasing this report @ https://www.gminsights.com/inquiry-before-buying/4484

Partial chapters of report table of contents (TOC):

Chapter 3. Encryption Software Industry Insights

3.1. Introduction

3.2. Industry segmentation

3.3. Industry landscape, 2015 2026

3.4. Evolution of encryption software

3.5. Encryption software industry architecture

3.6. Encryption software industry ecosystem analysis

3.7. Technology & innovation landscape

3.7.1. Quantum cryptography

3.7.2. Honey encryption

3.7.3. Lattice based cryptography

3.8. Regulatory landscape

3.8.1. North America

3.8.1.1. ENCRYPT Act of 2019 (U.S.)

3.8.1.2. Gramm-Leach-Bliley Act of 1999 (U.S.)

3.8.1.3. Personal Information Protection and Electronic Documents Act [(PIPEDA) Canada]

3.8.2. Europe

3.8.2.1. General Data Protection Regulation (EU)

3.8.2.2. Data Protection Authority (DPA) regulations on the transmission of personal data by e-mail (Denmark)

3.8.3. APAC

3.8.3.1. National Law on Cryptography (China)

3.8.3.2. Guide to securing personal data in electronic medium (Singapore)

3.8.4. Latin America

3.8.4.1. Law No. 9,296 of July 24, 1996 (Government Access to Encrypted Communications, Brazil)

3.8.4.2. National Directorate of Personal Data Protection (Argentina)

3.8.5. MEA

3.8.5.1. Policy of Control and Licensing of Commercial Encryption Items (Israel)

3.8.5.2. Regulation of Interception of Communications and Provision of Communication-related Information Act, 2002 (RICA- South Africa)

3.9. Industry impact forces

3.9.1. Growth drivers

3.9.1.1. Stringent regulations on cybersecurity and data privacy compliances

3.9.1.2. Rising concerns over securing enterprise Intellectual Property (IP) assets

3.9.1.3. Increasing proliferation of cloud and virtualization technologies

3.9.1.4. Growing trend of Bring Your Own Devices (BYOD) among enterprises

3.9.2. Industry pitfalls & challenges

3.9.2.1. Complexities in encryption key management

3.9.2.2. Easy availability of pirated and free-to-use encryption software

3.9.2.3. Regulatory restrictions on cryptography and encryption

3.10. Growth potential analysis

3.11. Porters analysis

3.12. PESTEL analysis

Browse complete report table of contents @ https://www.gminsights.com/toc/detail/encryption-software-market

About Global Market Insights

Global Market Insights, Inc., headquartered in Delaware, U.S., is a global market research and consulting service provider; offering syndicated and custom research reports along with growth consulting services. Our business intelligence and industry research reports offer clients with penetrative insights and actionable market data specially designed and presented to aid strategic decision making. These exhaustive reports are designed via a proprietary research methodology and are available for key industries such as chemicals, advanced materials, technology, renewable energy and biotechnology.

Contact Us:Arun HegdeCorporate Sales, USAGlobal Market Insights, Inc.Phone: 1-302-846-7766Toll Free: 1-888-689-0688Email: sales@gminsights.com

Read the original post:
Encryption Software Market to cross USD 20 Bn by 2026: Global Market Insights, Inc. - Yahoo Finance

Why Have So Few Women Won the Most Important Award in Computing? – Slate

Navy Rear Adm. Grace Hopper in 1978.

Lynn Gilbert/Wikimedia Commons

Recipients of the Turing Awardwidely considered the Nobel Prize of computingmay not be household names, but their innovations have wired our lives. Tim Berners-Lee (2016 Turing Award recipient) invented the World Wide Web and the first web browser. Whitfield Diffie and Martin Hellman (2015 recipients) invented public-key cryptographythe security ingredient that permits us, for example, to enter credit card numbers online with confidence. Raj Reddy (1994) pioneered artificial intelligence, which enables computers to understand spoken language. Yoshua Bengio, Geoffrey Hinton, and Yann LeCuns (2018) breakthroughs in deep learning have enabled self-driving cars, facial recognition, and more.

Nominations for the 2019 Turing Award are due to the Association for Computing Machinerythe awarding organizationby Jan. 15. The ACM typically announces the winner(s) in March. Later in June, it will honor the recipient(s), along with winners of its other, less prestigious computing prizes, at an awards banquet in San Francisco. If you attend, youll notice something stark: Nearly all of those who have received computings top prize have been men.

Reading through the recipient list, you could easily come away with the false impression that men are responsible for nearly all computing breakthroughs. Since the Turing Awards inception in 1966, 70 computer scientists have won it, only three of whom have been women. The first female recipient didnt win until 2006it took 40 years to recognize a woman. Some hypothesize that the dearth of women Turing Award recipients reflects womens underrepresentation in the field. However, the roughly 4 percent of women recipients does not approximate the fact that women currently earn 21 percent of the Ph.D.s in computer science, down from the 1987 peak of 37 percent.

Million-dollar prizes like the Turing Award seize the publics attention. Winners are sought-after, invited to give high-profile speeches, meet with business leaders, and advise politicians. For a certain nerdy cohortone I belong tothey are heroes. In public programming emanating from the ACM Awards Banquet and beyond, they serve as role models to inspire young people. When womens contributions are overlooked, the public forgoes opportunities to derive inspiration and gain advice from an important sector of computing pioneers.

And the ACM has definitely missed opportunities to recognize pioneering women computer scientists. Grace Hopper (19061992) worked on the first commercial computer produced in the U.S., created the first complier, and invented the first English-like data processing language. The ENIAC TeamBetty Jean Bartik, Kathleen McNulty, Mauchly Antonelli, Ruth Teitelbaum, Frances Spence, Marlyn Meltzer, and Frances Holbertonwas responsible for the worlds first general-purpose computer used for calculating World War II ballistic trajectories. Sister Mary Kenneth Keller (19131985) helped develop BASIC computer code. Radia Perlman (born in 1951) developed spanning tree protocol, making the internet possible. Judy Clapp (born in 1930) developed an air defense system prototype that used radar to track and direct aircraft courses. Karen Sparck Jones*(19352007) developed inverse document frequency, the technology underlying modern search engines. Stories of women computing pioneers could fill books. In fact, they do: A few gems include Broad Band: The Untold Story of the Women Who Made the Internet, When Computers Were Human, and Grace Hopper: Admiral of the Cyber Sea.

Fostering better gender inclusivity among Turing Award recipients and in the larger computing community is not only good for womenits also good for innovation and discovery. Gender diversity in science enhances the variety of viewpoints, questions, and areas addressed by researchersleading to a gender diversity dividend. Heterogenous groups of problem-solvers have been shown to outperform groups of homogenous, high-ability problem solvers, according to one study. Participants in diverse groups have been shown to prepare better in anticipation of dissenting opinions, which provokes thought and enhances their creativity, according to other studies. As one author wrote, Diversity jolts us into cognitive action in ways that homogeneity simply does not.

Nonetheless, research shows that systemic implicit and explicit bias impede women computer scientists. Pervasive stereotypes suggesting that they do not possess innate scientific talent also undermine women. Women who are perceived as feminine or adept at interpersonal skills are often deemed ill-suited for computing.

However, there is good news: Many of the very influential men who have received the Turing would prefer for the award to be more inclusive. We have been trying to prime the pump by having the [ACM] committees pay more attention to encouraging nominations in accordance with this broad desire to have all of the people represented, said Vinton Cerf (2004), recent co-chair of the ACM awards committee, and current chief internet evangelist at Googlewhere he is working on an interplanetary internet, among other pursuits.

Recognizing more women wouldnt, by itself, reduce the institutional barriers that limit womens advancement in computing. At universities, women researchers are called on for internal service roles tending to the academic family more often than men, which constrains their research time. Lack of maternity leave and affordable child care disproportionately affect women scientists during the vital early-career stages. Also, some family-friendly policies exacerbate gender inequities among research scientists, particularly as family leave policies have been shown to reduce mens teaching loads at a higher rate than womens. On-site child care has been shown to increase mens journal publicationsbut only womens teaching duties.

Some of the institutional problems are mirrored in the process of identifying potential Turing Award winners. The ACM relies on prominent computer scientists to write letters of support nominating candidates for the award. Academic letters in the sciences, necessary for career advancement and award nominations, have been shown disproportionately to contain language raising doubts about women electing to pursue science, which corroborates an earlier study. Those who are charged with evaluating professional accomplishments often do not account for mens tendency to overestimate their abilities or womens tendency to underestimate theirs. The result is a pool of Turing Award nominees that bears striking similarities to 50 years worth of draw-a-scientist experiments, in which children asked to draw a scientist overwhelmingly draw men. To be sure, not every woman in computing experiences all of these challenges. But many experience some.

We typically receive one woman nominee [for the Turing Award] every five years. Its very disturbing, said ACM President Cherri Pancake in September at the most recent Heidelberg Laureate Forum, an annual gathering of math and computer science laureates.

We need to nominate more women, said Turing Award recipient Robert Tarjan (1986) at the time. I can think of a number of women who should be nominated. They are deserving women.

Indeed. The ACM has made some progress toward gender inclusivity with regard to the Turing in recent years. Frances Allen (2006) was recognized for her work optimizing compilersprograms that translate code from one programming language into another. That laid the foundation for automatic parallel execution, in which large computational problems are divided into smaller ones that are solved simultaneously. Barbara Liskov (2008) was honored for pioneering contributions to programming languages and system design. And Shafi Goldwasser (2012) was celebrated for paving the way for the science of cryptography and inventing methods for efficiently verifying mathematical proofs in the study of complex systems.

Nonetheless, Allen, Liskov, and Goldwasser could use company not only on a potential trip to the ACM Awards Banquet or the Heidelberg Laureate Forum, but in the publics collective conscious concerning what computer science heroes look like.

Correction, Jan. 7, 2020: This article originally misidentified Karen Sparck Jones as Katherine Spark Jones.

Read the rest here:
Why Have So Few Women Won the Most Important Award in Computing? - Slate

Quantum Cryptography Market Size and Key Trends in Terms of Volume and Value 2019-2024 – Instanews247

The global quantum cryptography market should reach $1.3 billion by 2024 from $347.2 million in 2019, with a compound annual growth rate (CAGR) of 30.7% during the forecast period 2019-2024.

Report Scope:

The scope of this report is broad and covers global markets of quantum cryptography, which is used globally in various types of applications. The market is segmented by deployment protocol, algorithm type, component, application, end-user vertical, and by region. Revenue forecasts from 2019 to 2024 are presented for each deployment protocol, algorithm type, component, application, end-user vertical, and regional market.

Get More Information: https://www.trendsmarketresearch.com/report/sample/11754

The report also discusses the major players in each of the regional markets for quantum cryptography. It explains the major market drivers of the global market of quantum cryptography, the current trends within the industry, and the regional dynamics of the quantum cryptography market. The report concludes with a special focus on the vendor landscape. It includes detailed profiles of the major global vendors in the quantum cryptography industry.

Report Includes:

86 tables An overview of the global market for quantum cryptography Analyses of global market trends with data from 2018, estimates for 2019, and projections of compound annual growth rates (CAGRs) through 2024 Assays the role of quantum cryptography to help secure private messages and communication of confidential information across different verticals Information on underlying technologies driving the industrys growth along with primary factors current trends, regulatory updates, and other macro-economic factors that can influence the market Insights into initiatives taken by government and institutions around the world to build quantum computers that can break down non quantum-based cryptography Snapshot of technological advancements in next-generation wireless network technologies Detailed profiles of key companies in the global quantum cryptography market, including Crypta Labs Ltd., Hewlett-Packard, IBM, Infineon Technologies AG, Microsoft Corp., Quintessence Labs Pty Ltd., and Toshiba Corp.

Make an Inquiry before Buying: https://www.trendsmarketresearch.com/checkout/11754

Summary

Quantum cryptography uses quantum mechanical properties to complete cryptographic tasks. The Quantum Key Distribution (QKD) technology in quantum cryptography is based on Heisenbergs uncertainty principle. Therefore, an unauthorized third partys attempt to intercept the secret keys used for encryption will produce an irreversible change in the quantum states before they are retransmitted to the intended destination. This will cause an abnormally high error rate in the transmissions between the sender and intended recipient, alerting the recipient of the unauthorized third partys attempt to intercept the keys. Quantum cryptography is used across industries such as government and defense,banking and financial services, IT and telecommunications, and retail, among others.

The increasing number of cyberattacks, along with the pressing need to secure data and cybersecurity funding should drive the growth in the global market of quantum cryptography. Governments and institutions around the world are directing financial resources toward build quantum computers that can instantly break non-quantum-based cryptography. This also has created an increased interest in quantum cryptography as many companies are seeking to install quantum cryptographic systems to protect their data. The IT and telecommunication sector should be the largest contributor to the global market of quantum cryptography because enterprises in this segment continuously generate big data.Protection from cyberattacks is vital.

View post:
Quantum Cryptography Market Size and Key Trends in Terms of Volume and Value 2019-2024 - Instanews247

nCipher Security CSO Pali Surdhar, on what to expect in 2020 – Security Boulevard

nCipher Security CSO Pali Surdhar, on what to expect in 2020

ncipher

Mon, 01/06/2020 22:20

To paraphrase the wise fictional character Ferris Buellerthe IT security world moves at a pretty fast pace. If you dont stop and look around once in a while, you miss out on a business world rite of passage: 2020 predictions.

Below, nCiphers CSO Pali Surdhar on what we might expect in 2020, as broken down by topic area.

Consumers will continue to demand a better user experience and always on availability of their devices and applications, which will require them to give up even more PII data to applications and services. This will happen readily, despite the ongoing publicity around dubious business privacy practices. As software (or rather, APIs) continue to eat the world, security and securing software (especially embedded systems) will continue to prove challenging, leading to even more breaches. 2019 is proving to be a banner year for breaches, and theres no reason to believe 2020 will be a positive exception to the rule.

The hype around blockchain will abate, as both consumers and businesses come to understand blockchain is not a financial panacea. Keeping blockchain technology secure still entails relying on security best practices, which include secure key management and correct use of cryptography. Concurrently, well see a focus on quality over quantity: blockchain applications will become more meaningful due to a better understanding of the limitations of the system and where real benefits may be derived.

Supply chain security and assurance will increasingly take the data security spotlight. As companies seek to cut costs and increase efficiencies by collaborating with multiple third-parties, their supply chains have become even more complex. Transparency is necessary for security, but the degrees of separation within a supply chain have made this goal even more unreachable.

Security professionals will be more difficult to recruit despite the huge interest and awareness around the importance of this role. This is because the focus on security is moving up the stack. Cloud deployments are becoming more attractive and embedded hardware less so. Security in the cloud requires a different model, and budding professionals are being taught high-level languages such as python. Unfortunately, theyre then missing out on the appreciation of processor architecture necessary when working with lower level languages and embedded systems.

In 2020, cyber criminals will leverage AI and machine learning (ML) to find exploits on systems and it will lead to prolific and public data security breaches. AI and ML are powerful tools for data crunching I expect that we will start to see the development of exploit tools that are based on AI and ML. We also know that AI and ML systems can be defeated or biased to give anomalous results. Additionally, most of the data being used for AI and ML is not normally under the control of a single body. There are multiple sources and owners, so preserving the integrity data used to train intelligent systems is not an easy problem to solve. Attackers can easily exploit this loophole.

A contrived example is that your Garmin collects your health data and your insurance company finds out that you have a heart murmur and decides to increase your insurance premium so whoever controls the data can modify the outcome. The bottom line is that AI and ML are double-edged swords, and that reality will increasingly become apparent.

Click here to read more predictions from nCiphers executive team. You can also follow nCipher on Twitter, LinkedIn, and Facebook.

Blog Authored date

Wed, 01/08/2020 12:00

*** This is a Security Bloggers Network syndicated blog from Drupal blog posts authored by ncipher. Read the original post at: https://www.ncipher.com/blog/ncipher-security-cso-pali-surdhar-what-expect-2020

View original post here:
nCipher Security CSO Pali Surdhar, on what to expect in 2020 - Security Boulevard

Podcast: The Overhype and Underestimation of Quantum Computing – insideHPC

https://radiofreehpc.com/audio/RF-HPC_Episodes/Episode260/RFHPC260_QuantumQuantum.mp3In this podcast, the Radio Free HPC team looks at how Quantum Computing is overhyped and underestimated at the same time.

The episode starts out with Henry being cranky. It also ends with Henry being cranky. But between those two events, we discuss quantum computing and Shahins trip to the Q2B quantum computing conference in San Jose.

Not surprisingly, there is a lot of activity in quantum, with nearly every country pushing the envelop outward. One of the big concerns is that existing cryptography is now vulnerable to quantum cracking. Shahin assures us that this isnt the case today and is probably a decade away, which is another way of saying nobody knows, so it could be next week, but probably not.

We also learn the term NISQ which is a descriptive acronym for the current state of quantum systems. NISQ stands for Noisy Intermediate Scale Quantum computing. The conversation touches on various ways quantum computing is used now and where its heading, plus the main reason why everyone seems to be kicking the tires on quantum: the fear of missing out. Its a very exciting area, but to Shahin, it seems like how AI was maybe 8-10 years ago, so still early days.

Other highlights:

Download the MP3 *Follow RFHPC on Twitter *Subscribe on Spotify *Subscribe on Google Play *Subscribe on iTunes

Sign up for the insideHPC Newsletter

Go here to see the original:
Podcast: The Overhype and Underestimation of Quantum Computing - insideHPC