Watch: Unpacking Bitcoin, blockchain and the cryptos shaking up the world of finance – Euronews

What are cryptos?

Cryptocurrencies are virtual currencies that can be used to buy goods and services but rely on a ledger and cryptography to secure and verify transactions rather than a trusted third party.

Bitcoin is the name of the original cryptocurrency. It was designed to allow users make digital payments without relying on financial institutions like banks.. This also means its users can send or receive money anonymously.

In 2008, a developer known only as Satoshi Nakamoto uploaded the Bitcoin whitepaper to a cryptography mailing list, laying out his vision for the first cryptocurrency.

The same individual is believed to be responsible for deploying the source code and protocol that Bitcoin is based on. There is still no definitive answer as to who Nakamoto is or whether it was someone working alone or a group of people working together.

Bitcoin is built on a publicly distributed digital ledger known as the blockchain. This allows a record of all transactions to be compiled and shared across a peer to peer network. The same ledger protects the system from the problem of double spending, which is the risk that a digital token or a digital coin can be spent twice.

Under the bitcoin protocol, every ten minutes a block of all the transactions carried out on the network in the preceding ten minutes is compiled and verified through what is known as Proof of Work mining.

The Proof of work mechanism requires computers in the network to compete in a race to solve a computational problem. Think of it as an elaborate game of guess the number where the higher your computational power is, the higher your chances are of winning.

The first computer to solve the problem is allowed to verify the block and add it to the blockchain, earning Bitcoin as a reward.

Under the Bitcoin protocol, the computational problem to be solved becomes more complex the more computers there are trying to solve it.

The idea behind proof of work is to make the network more secure and protect it from attacks, spammers or individuals gaming the system.

Critics point out that its hugely energy intensive, leading to recent concerns about Bitcoins environmental impact.

See the article here:
Watch: Unpacking Bitcoin, blockchain and the cryptos shaking up the world of finance - Euronews

How do you make supply chains more visible without compromising security? A Dutch start-up may have the answer – The European Sting

(Credit: Unsplash)

This article is brought to you thanks to the collaboration ofThe European Stingwith theWorld Economic Forum.

Author: Sean Fleming, Senior Writer, Formative Content

Better supply chain visibility can boost sustainable production methods and provide greater confidence to businesses on where their materials are coming from. It can also offer insights into who is working for all the businesses connected to a particular supply chain.

It is, however, a major headache for organizations. The data journalism site Statista cites a 2018 survey which found that the biggest challenge (21.8%) for global supply chain executives was visibility.

A Netherlands-based start-up called Circularise has been working on a technology platform that helps deliver the kind of supply chain transparency many businesses would like, while overcoming one of the biggest concerns businesses have the security of their sensitive data.

Total transparency

Circularise, a member of the World Economic Forums UpLink platform, uses what it describes as a combination of blockchain, peer-to-peer technology and cryptography like Zero-Knowledge Proofs (ZKPs) in a decentralized information storage and communication platform. It allows information exchange between participants in value chains while retaining the ability to fine-tune the amount of information disclosed.

Blockchain is an early-stage technology that enables the decentralized and secure storage and transfer of information. It has the potential to be a powerful tool for tracking goods, data, documentation and transactions. In this way, it can cut out intermediaries, reduce corruption, increase trust and empower users.

The potential uses of blockchain technology are essentially limitless, as every transaction is recorded and distributed on a ledger that is almost impossible to hack. Though the most well-known use case is cryptocurrencies, blockchain is being positioned to become a global decentralized source of trust that could be used to collect taxes, reduce financial fraud, improve healthcare privacy and even ensure voting security.

Blockchain has the potential to upend entire systems but it also faces challenges. Read more about the work we have launched on blockchain and distributed ledger technologies to ensure the technology is deployed responsibly and for the benefit of all. Were working on accelerating the most impactful blockchain use cases, ranging from making supply chains more inclusive to making governments more transparent, as well as supporting central banks in exploring digital currencies.

Blockchain works like a database that groups related pieces of data together into units called blocks and connects them together sequentially in chains. Each block of data contains information regarding when they were created or amended, becoming a permanent record of the history and provenance of each block in the chain. Anyone party to a blockchain database can see who has made changes and when things have been added or removed.

In that way, blockchains can be used to provide an ultra-robust record of the provenance of anything that can be recorded in a database, making it possible to know the name of the farm that grew the food you eat, for instance. Or in the case of industrial processes, whether the recycled aluminium in an order actually came from a source of recycled aluminium.

Cryptography for sensitive information

Few businesses would be willing to let the rest of the world access their commercially sensitive data its one of the reasons cybersecurity is so important.

From trade secrets to lists of materials and details of business deals, there are many examples of data within a supply chain that businesses dont want to share openly. Naturally, this makes the open and accessible nature of blockchains less appealing.

The World Economic Forums Centre for Cybersecurity is leading the global response to address systemic cybersecurity challenges and improve digital trust. We are an independent and impartial global platform committed to fostering international dialogues and collaboration on cybersecurity in the public and private sectors. We bridge the gap between cybersecurity experts and decision makers at the highest levels to reinforce the importance of cybersecurity as a key strategic priority. World Economic Forum | Centre for Cybersecurity

Our community has three key priorities:

Strengthening Global Cooperation to increase global cooperation between public and private stakeholders to foster a collective response to cybercrime and address key security challenges posed by barriers to cooperation.

Understanding Future Networks and Technology to identify cybersecurity challenges and opportunities posed by new technologies, and accelerate forward-looking solutions.

Building Cyber Resilience to develop and amplify scalable solutions to accelerate the adoption of best practices and increase cyber resilience.

Initiatives include building a partnership to address the global cyber enforcement gap through improving the efficiency and effectiveness of public-private collaboration in cybercrime investigations; equipping business decision makers and cybersecurity leaders with the tools necessary to govern cyber risks, protect business assets and investments from the impact of cyber-attacks; and enhancing cyber resilience across key industry sectors such as electricity, aviation and oil & gas. We also promote mission aligned initiatives championed by our partner organizations.

The Forum is also a signatory of the Paris Call for Trust and Security in Cyberspace which aims to ensure digital peace and security which encourages signatories to protect individuals and infrastructure, to protect intellectual property, to cooperate in defense, and refrain from doing harm.

For more information, please contact us.

The ZKPs that Circularise uses keeps information hidden indefinitely, while still allowing users of the blockchain to interrogate it. Rather than list all the materials in a component, the ZKP acts as a question-and-answer portal. Circularise says on its website: Smart Questioning allows stakeholders to ask critical questions (eg, Does this plastic part contain hazardous materials?) to a secret dataset (eg, the bill of materials).

This approach makes it possible for businesses across a supply chain to share information about their products on an open blockchain-based system without exposing their sensitive data.

Circularise is one of 17 companies selected from more than 200 applicants for The Circulars Accelerator Cohort 2021, which is run in collaboration with UpLink, the World Economic Forums innovation crowdsourcing platform.

The six-month programme which is led by Accenture, in partnership with Anglo American, Ecolab and Schneider Electric helps circular innovators scale their solutions by providing them with tailored support and mentorship, and connecting them with industry leaders.

It operates through UpLink, which launched at the World Economic Forum Annual Meeting in 2020. The platform crowdsources expertise and resources to help scale up innovative ideas that can advance the UNs SDGs.

View post:
How do you make supply chains more visible without compromising security? A Dutch start-up may have the answer - The European Sting

Solving the Global Epidemic of Data Forgery and Cyber Attack. – Stockhouse

As data forgery and theft continues to plague businesses and individuals alike, real word, real time solutions are needed to battle the bad actors infiltrating private corporate and personal data.

Enter SoLVBL Solutions Inc. (CSE.SOLV, OTCMKTS: SOLBF, Forum) a cybersecurity engineering company specializing in applications that address critical data integrity problems. In short, a proprietary, patent-pending data authentication solution that creates trustfast.”

Stockhouse Media’s Dave Jackson caught up with company CEO Ray Pomroy to get investors up-to-date with all things SoLVBL Solutions.

TRANSCRIPT BELOW:

SH: To start off with, can you tell us a little bit about yourself and the history of the company?

RP:Sure. Well my background is supply chain. That's really where I spent most of my career and I worked in Europe, in Canada, in the US. For my sort of final, big corporate job, I looked after all the Personal Care Supply Chain for North America for a rather large company, I think it's the second largest consumer goods company in the world. And that was a great job. I managed a billion dollars of costs, seven factories, 2000 people, a lot of change, a lot going on. So really, I look after the total supply chain. When I came into this company , it was called Agile Blockchain. I came in as a Director due to my Supply Chain background and the company was focused on supply chain solutions using a blockchain.The CEO left end of 2019. And I offered to come in on a temporary basis hold the fort whilst we got a permanent CEO.

And that's what I did. I came in, you know, first thing was to ask everyone what they were doing, what we were working on, what was going on. And I was pretty underwhelmed actually. I thought most of it was pretty generic. I didn't think that we could charge high margins for anything we were doing. All the problems with blockchains being slow were all beginning to manifest themselves as we were trying to find some products. Our clever Developershad realized the problems with blockchains and had tried to find a solution to the speed and latency issues. As I was going through with them what, what we were working on this issue came up. They proposed a way of tackling it, I was so taken with it because it was different, it was new, it was novel that I actually shut down all the other work and we pivoted. We decided to forget the supply chain and focus on this idea. It’s why SoLVBL as we are now called came into being. We decided to run with this idea and turn it into something, turn it into code, turn it into a product, get it working. And I have to say at the time it was just a concept. I mean, it wasn't anything more than a concept and the guys have done a fantastic job to turn that concept actually into a potential product. As a consequence, we decided that agile blockchain was a name that just confused people. So we changed our name to SoLVBL solutions. Not that long ago, actually. I think it was probably around the turn of the year that we dropped the Agile Blockchain and became SoLVBL solutions.Andchanged our focus, as I say, away from supply chain into the cyber security area. Although we didn't really think of it as cyber security at the time. The way we looked at it was in the real world, the world that you and I live in, if you want to forge a Check there are ways that I can check the Check is authentic. I can check your handwriting. I can check the ink that you've used. I can see when the paper's scuffed under a microscope, there's lots of physical things I can do to see whether you've actually committed forgery. In the digital world. It's just ones and zeros. That's all. And as you know, one set of ones and zeros are very much like another set of ones and zeros. And how would you know where the ones and zeros had been changed? In our view, you wouldn’t. Enter SoLVBL.

So what we have done is developed a product , such that when you create data, you essentially interact with us. And we mutually seal up the data and we provide the equivalent of the thumbprint, and that thumbprint travels forever with that data. If anyone comes in and in a malicious way, a bad actor comes in and decides to substitute the data or modify the data, whatever, then the thumbprint on the changed data don't match up. When you use the data, you can have it authenticated automatically. And if someone's come in and changed the data you can detect it. So our view is you can't stop digital fraud. It's too difficult to stop it. But what you can do and what we offer is authentication. Detection, if it’s changed . We're different. Although we say we're a cybersecurity company, we're different from a lot of other cyber security businesses.Normally the strategy, if you go back to the old castle days, you build a castle, you put a moat around it, you have a drawbridge, which can be raised, you make the walls very high and you stop people from coming in. However, if someone manages to get in, once they're inside the castle walls, they’re free roam around, they're free to do whatever they like. That's a space that we want to play in , we're not a typical cybersecurity company. We're not offering, you know firewalls and defenses that are on the boundaries. We’re essentially saying, look, you just will not be able to stop everyone from coming in. So it makes far more sense to protect your data inside the organization. Other Companies can, can help you provide the walls to try and keep the hackers out.

But if a hacker gets through, then our system allows you before you use data, to authenticate it and to feel confident that it hasn't been manipulated. And when you think about the way the world's moving now, data is just exploding. Data’s been used for all sorts of things, Algorithms, it’s being used for AI. And you knowif you're going to use the automated systems to produce results, and to run your business then you've got to know that the input is valid. When I went to school, they taught us, garbage in, equals garbage out. And so what we can do is we can tell you whether garbage is coming in or not. Then you don't have to use the garbage” data and you're protected.

So that, in a nutshell, is how we've ended up where we are today. We started off with a Blockchain focus. We didn't like the speed and latency issues around Blockchains. I'm not knocking Block chains, by the way, they have their place, but they can't operate at speed and they have high latency associated with them And we looked to solve those issues ,originally for supply chain solutions. But soon as I realized that we potentially had a wider solution, it made far more sense to pivot into the world that we're now focused on.

SH: For our investor audience that might not be that familiar with cybersecurity solutions and the technology behind it, can you tell us basically how your technology works and what makes SoLVBL so different and innovative?

RP:Well, I can't tell you exactly how it works because it's a trade secret. I think I can give you a rough idea. So we use a combination of cryptography and blockchain. Although this is not a hundred percent accurate analogy, I think this is a good way to think about what we do. If you go to your lawyer and you want to set a up a will. Normally the lawyer signs it, you sign it and a witness witnesses the signatures so that the lawyer can't say the document didn't exist and he didn't sign it. You can't say the same thing. And an independent witness has actually watched the two signatures. Sowhat we do with cryptography and a blockchain is something akin to that. You send me data here, you are signing it. We receive the data, we're signing it. And that's all done with cryptography.

And then with a clever use of the blockchain, the blockchain sort of becomes a witness to the event. So we can't say this, this didn't happen. And it doesn't exist. By the way I should add, I didn't say it in the first part, butwe were totally data agnostic. We never see the data. The data never leaves your control, if you're someone who wants to protect your data, your data stays your data. We have no idea what it is. It could be spreadsheets. It could be a housing predictions. I mean, who knows? We don't care. Actually, all we do is we take a representation of the data. And then we, we work to magically use cryptography, and a blockchain. We give you this little thumbprint, which allows you at any stage to authenticate the data. Actually anybody else using the data can authenticate the data as well. You can confirm the data is as it was when it was first created, plus the data never leaves your possession.

SH: You also announced in March that the company had increased its cryptography capabilities. Can you unpack the benefits of this?

RP: Sure. Cryptography is a very specialist area. It's a highly mathematical area. And we had arrived at the solution with non-cryptographic people being very clever and being very imaginative and very innovative. And we worked out a way of solving a problem. What we needed was validation from a cryptographer. Someone independent to come in and have a look at what we've done and say, yeah, that works. We struggled to find cryptographic help. First of all, there aren't many cryptographers. Secondly, they're all very busy because every major institution, every major bank scoops these people up and uses them. So it was very difficult for us to get somebody. And then it was very difficult for us to find someone who would be interested in working with a small startup company and helping them. However, we did find someone and we're very pleased and it's working out to be a very good collaboration.

She's bringing a lot to the party. She's bringing a way of thinking and analysis that is different to the way we work. And of course we're bringing a different way of thinking , as well for her. So it's a good mutual combination and I see lots and lots of potentially innovative products coming down the line. And so once this first phase is over, there'slots of ideas for products that we have where she can be very helpful to us. So maybe she can get involved from the word go. I think it's just very exciting and I'm very pleased we actually found somebody. It took me almost nine months to find a cryptographer.

SH: For company shareholders and potential investors, what kind of future development and projects can we expect from SoLVBL moving through 2021 and beyond?

RP:Well, the first thing, obviously, we've got to do is to get to Q by SoLVBL into the marketplace, we've got to get it in use, we've got to generate revenue and make some sales. The big priority for me is to get into a trial situation that leads to sales. And we're targeting three areas where we think we can offer something that's valuable and that people will be prepared to pay for it. One obviously is the financial world, where there’s a lot of data moving around or a high value data moving around and it's important that, fraud isn't actually occurring in this movement. So that's one area that we feel that we really want to target. And we have plans in place for that. The two other areas thatwe envisioned for the use of our technology, one of them is it's called NG 911, or you may not have heard very much about this, but the NG stands for Next Generation.

911 is the emergency service. And what's happening is the world is changing and everyone's got as everyone's got a smartphone. For example, if there's an accident on the side of the road, people are taking videos, they're taking photographs and they're sending these things into 911. They're sending texts and they're tweeting, it's not only landline phone calls any longer. It's a whole range of digital interactions. And of course, some of the stuff that comes in may be needed for evidence., There may be court cases that arise and maybe lawsuits that come out of it. We believe, we have an opportunity to use our system to seal up data as it's actually coming in and authenticated it. So that at some later stage you can authenticate it as the original feed that came in. You can show someone hasn't photo-shopped it. You can also see someone hasn't sent something in that they Photoshopped. We can say, no, this is the real video. as we received it. It's been sealed up and no one's altered it. So what you're now producing as evidence obviously has been photo-shopped because it doesn’t match the original.

So we see that as, NG 911, rolls out, mainly in America, to start with and later in Canada. There’s a huge opportunity for us to get in there and offer our services. And of course this will ultimately be a worldwide phenomenon. Once it's finished in North America, you know, it's going to happen in Europe, it's going to happen in South Africa, Australia, Latin America. So that's a nice global opportunity there for us. And out of thinking about that, we then came to the third area that we believe that we have something to offer, and that is the Digital Chain of Evidence.

So this is the world where the police operate in. Increasingly the evidence that police are collecting is digital and that they have very complicated procedures. We have looked at what they do, and we believe that we can offer some productivity savings and cost savings and some speed savings to them. So that's the other area that we'll be focusing on. Over the next period of time, you should be looking for news in those areas coming from us. That's what we're focusing on. We have to focus. We have limited resources. Although I can think of lots and lots of uses for this product we need to focus. The mantra t we use inside the businesses is if the data worth forging, it’s worth protecting”. We're not in the game of just protecting data for the sake of protecting it.

There has to be some value to someone to get in there and forge the data. Either they can pocket some money, they can influence a trial, they can change, they can change outcomes, whatever. That's where we want to play. That's where we want to go. And that, I think over the next 18 months, you should look for news items that come out that shows that we've got trials going on in those areas. And then hopefully those trials will lead to business and to orders.Not an issue of course, it's educating people to understand that there's actually a problem here. I can say there's a problem. I'm not the person who will be buying the software. So we have to convince the potential customers that there's a vulnerability. And not only is there a vulnerability, but you wouldn't even know if someone was doing it to you. So it's not like you can have a problem and go, oh, I've got a problem. I need to solve it. This could be going on today and you wouldn't know. It's a bit more of a harder sell for us, but once we're in and we can demonstrate the product, the speed, the latency, and the ability of the software, I think we'll be fine.

SH: I have to mention your stock has been on a bit of a roller coaster ride since you went public back in late February. What can you tell our investor audience regarding the current valuation of your stock and why you think it’s a good buy right now?

RP:So I have to be a bit careful in answering this particular question because it's a little bit outside of my expertise level. What I will say is that we have something that's unique. We have something that works. There's a real problem out there that needs a solution, even if people don't necessarily know or have realized yet there's a problem. So I think we've all the ingredients to be very successful, but it's not going to be an overnight. It's not like we're putting an app out and, you know, we're going to be the next Tik Tok or something. I mean, we're talking about selling business to business, and we're talking about pretty high value deals. So, you know, the sales cycle is going to be a little bit long, I don't think you should expect news coming out every week.

If you want to invest in the stock, I think you have to believe there's actually a problem that we have a solution to the problem, and that we are capable going out there and convincing people to buy our product and if we're right in our view , the stock looks like a bargain at the present moment. But all that stuff has to happen and it's not going to happen in a week and it’s not going to happen in two weeks. It's not going to happen in a month. It takes time to get it, to get to the right people and then persuade them. There's an issue that needs addressing, , to do a trial, to see the results, and then to part with their hard-earned money. It's just a long sales cycle.

SH: Can you tell our audience a little bit about your corporate management and board teams, along with the experience and innovative ideas they bring to the cybersecurity space?

RP:Yeah. As well as I said at the start,we've sort of backed into the cyber security space. So, when the company was started, that really wasn't the target market, but we're lucky we have on our board, we have someone with great financial experience. We have someone with great academic connections and experience and in the digital world, we our chairman is someone who actually has started up digital businesses made them successful, had them bought out and come back in and started again. So there's an entrepreneurial mindset there. And we have someone who is very good on the HR side. So we've got a nice, rounded board as for the management team. There's two of us, there's me. And I told you, my background. And I work with a CFO who has lots of experience in small entrepreneurial companies, companies that have gone public. So he brings a lot of financial wisdom to the party and realism for that matter. And I have to say that, although they're not defined as a management team, the developers that we've got are fantastic. They're very, open-minded, they're very interested in learning new stuff and applying new stuff. And I, I'm pretty impressed actually with the team, everyone that we've got actually. So I think it bodes well for the future.

SH: And finally, Ray, if there’s anything I’ve overlooked please feel free to elaborate.

RP:No, I think you've been pretty comprehensive there, Dave, actually, I think we've covered,most of the ground. I think you knowas in everything else, the proof of the pudding is in the eating. So when someone actually buys our system and it's in use, you'll know that what I'm saying is for real. I know it's for real, and I'm pretty excited ,if it wasn't real and exciting, I'm not sure I'd be doing this present at the present moment. You know, I think this is, it's an unusual situation that you find you've developed something, which is new, and unique, and that there's a real need for it. So watch the space. I think that's what we'll be saying.

For more information, visit solvbl.com

FULL DISCLOSURE: This is a paid article produced by Stockhouse Publishing.

See the original post here:
Solving the Global Epidemic of Data Forgery and Cyber Attack. - Stockhouse

Atos strengthens its cybersecurity offering thanks to the acquisition of German cryptography specialist cryptovision – GlobeNewswire

Paris, France and Munich, Germany April 20, 2021 Atos today announced that it has signed an agreement to acquire cv cryptovision GmbH, a leader in state-of-the-art cryptographic products and solutions for securing digital identities. This acquisition will strengthen Atos cybersecurity product lines and boost the companys business in the public sector and defense market in Europe.

Founded in 1999 and headquartered in Gelsenkirchen, Germany, cryptovision designs, develops and implements cryptography software, security solutions and hardware products. Its unique solutions are made in Germany, certified by the Federal Office for Information Security (BSI) and accredited by the NATO. The company has a proven track-record of successfully addressing organizations digital security challenges, in particular those in the public and defense sectors, as well as other sectors with highly demanding regulations and security standards.

The combination of the two companies will enable numerous synergies in their go-to-market approach. Atos will benefit from cryptovisions strong network of resellers and global technology partnerships in the e-ID markets. cryptovision will benefit from Atos trusted relationship with European government customers and the Groups ability to deliver end-to-end integrated solutions on national and international scale.

We are delighted to welcome cryptovision to the Atos family and to work together to develop even more effective security solutions that meet growing cybersecurity and privacy needs. cryptovision products complete the existing Atos cybersecurity products portfolio so we will be able to address new projects and customers, both in the German market and internationally. This strategic move further expands Atos' strategy to strengthen its cybersecurity presence, capabilities and portfolio worldwide. says Pierre Barnab, Senior Executive Vice President, Global Head of Big Data & Security at Atos.

With the now agreed affiliation with Atos, cryptovision benefits in many ways in particular through the global presence and comprehensive cyber security expertise of an international group. At the same time, cryptovision will be able to expand its technological depth of value creation for its customers, says Markus Hoffmeister, Founder and CEO of cryptovision.

The transaction is expected to close by end of Q3 2021 and is subject to the approval of the local governance and regulatory bodies of both parties.

***

About Atos

Atos is a global leader in digital transformation with 105,000 employees and annual revenue of over 11 billion. European number one in cybersecurity, cloud and high performance computing, the Group provides tailored end-to-end solutions for all industries in 71 countries. A pioneer in decarbonization services and products, Atos is committed to a secure and decarbonized digital for its clients. Atos operates under the brands Atos and Atos|Syntel. Atos is a SE (Societas Europaea), listed on the CAC40 Paris stock index.Thepurpose of Atosis to help design the future of the information space. Its expertise and services support the development of knowledge, education and research in a multicultural approach and contribute to the development of scientific and technological excellence. Across the world, the Group enables its customers and employees, and members of societies at large to live, work and develop sustainably, in a safe and secure information space.www.atos.net

Atos contacts

Investor Relations: Gilles Arditti +33 (0)1 73 26 00 66 gilles.arditti@atos.net Global Press Relations: Lucie Duchateau - +33 (0)7 62 85 35 10 lucie.duchateau@atos.netGermany Press Relations: Stefan Pieper - +49 178 4686875 - stefan.pieper@atos.net

About cryptovision

cv cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and secure electronic identities. With its solutions, over 250 million people world-wide and a multitude of institutions in the digital world protect themselves against hacker attacks, manipulation, misuse of identities and espionage. cryptovision addresses various industries such as public administration, health, auto-motive, finance & insurance, energy or IT. Its customers include countries such as Nigeria, Ghana and Ecuador, institutions such as the German Armed Forces, the German Federal Office for Information Security (BSI), the city of New York and companies such as E.ON, VW and Allianz.

cryptovision contact

Veronica von Preysing, SVP Marketing - +49 173 308 2298 - veronica.preysing@cryptovision.com

Excerpt from:
Atos strengthens its cybersecurity offering thanks to the acquisition of German cryptography specialist cryptovision - GlobeNewswire

NTT Research Names Matthew Ireland Chief Information Security Officer – Business Wire

SUNNYVALE, Calif.--(BUSINESS WIRE)--NTT Research, Inc., a division of NTT (TYO:9432), today announced that it has named Matthew Ireland Chief Information Security Officer (CISO). Most recently a consulting Practice Manager and Executive Security Strategist at NTT Ltd., Ireland is a technology leader with management experience in security services, consulting, financial services, healthcare, manufacturing, law enforcement and emergency services and three decades of technical experience in information security, IT systems, networks and enterprise operations. He joined NTT in 2016 and served as a virtual (v)CISO for NTT Research beginning in September 2019. Ireland joined NTT Research full-time in March 2021. In this role, he will be responsible for information security, privacy, risk, compliance, physical security, incident response and some aspects of workplace safety.

We are so pleased to have Matt Ireland on board, said NTT Research President and CEO, Kazuhiro Gomi. His experience is deep and broad, and he is already very familiar with NTT Research and understands our security requirements, especially how they play out across our research labs.

Prior to his most recent roles in strategy and management at NTT Ltd., Ireland served as VP Global Cyber Security Operations, Regional CISO and Director of Information Security Operations at NTT Security. In these roles, Ireland managed a consulting team, provided strategic advisory services and directed various areas of information security architecture, strategy, technology operations and risk. He has had a leadership role in three complex enterprise data center moves and supported numerous client compliance audits. At NTT Research, Ireland will be engaged in both the cybersecurity of the companys three labs and the physical security of its Sunnyvale office. NTT Researchs Physics & Informatics (PHI) Lab, Cryptography & Information Security (CIS) Lab, and Medical & Health Informatics (MEI) Lab have distinctive security profiles and high expectations for privacy and secure IT operations.

It has been exciting to have NTT Research as an important part of my work over the past year and a half, and I am thrilled to now transition into the company full time, Ireland said. Like all organizations today, we face ever-changing technology challenges and threats, but I am committed to keeping NTT Research aligned with global security expectations as it fulfills its agenda at Sunnyvale, across remote workplaces and with key collaborators around the world.

Prior to joining NTT in 2016, Ireland served as an Enterprise Availability Engineer at Wellmark Blue Cross & Blue Shield and as a Director, Manager and Specialist at Harland Clarke Holdings, a financial services corporation. Ireland holds a BS in Information Assurance & Security, an MS in IS/IT Management and nine additional certifications. He is a member of five professional organizations and served as vice president of a local chapter of InfraGard, a public-private partnership between U.S. businesses and the Federal Bureau of Investigation (FBI). Ireland is also a trained emergency medical technician (EMT), a reserve county deputy sheriff and former fire chief of the local volunteer fire and rescue department (where he now continues to serve as a captain).

About NTT Research

NTT Research opened its offices in July 2019 as a new Silicon Valley startup to conduct basic research and advance technologies that promote positive change for humankind. Currently, three labs are housed at NTT Research facilities in Sunnyvale: The Physics and Informatics (PHI) Lab, the Cryptography and Information Security (CIS) Lab, and the Medical and Health Informatics (MEI) Lab. The organization aims to upgrade reality in three areas: 1) quantum information, neuroscience and photonics; 2) cryptographic and information security; and 3) medical and health informatics. NTT Research is part of NTT, a global technology and business solutions provider with an annual R&D budget of $3.6 billion.

NTT and the NTT logo are registered trademarks or trademarks of NIPPON TELEGRAPH AND TELEPHONE CORPORATION and/or its affiliates. All other referenced product names are trademarks of their respective owners. 2021 NIPPON TELEGRAPH AND TELEPHONE CORPORATION

Read more here:
NTT Research Names Matthew Ireland Chief Information Security Officer - Business Wire

TransUnion and Spring Labs Partner to Transform the Exchange of Sensitive Data – GlobeNewswire

CHICAGO, April 21, 2021 (GLOBE NEWSWIRE) -- With an unrelenting focus on information security and consumer privacy, TransUnion (NYSE:TRU) continues to build and invest in technology to help businesses and consumers transact in an increasingly digital marketplace. The company is advancing this goal with a preferred equity investment and strategic cooperation agreement with Spring Labs, an advanced cryptography and blockchain based financial technology firm transforming the exchange of sensitive data. Together, Spring Labs and TransUnion aim to increase access to Spring Labs data exchange network and products, while enabling TransUnion to expand protection of sensitive consumer data and promote transformative technology in its business.

Spring Labs built a state-of-the-art technology protocol that cryptographically transforms and anonymizes data to unlock new data and products, said Steve Chaouki, President of U.S. Markets at TransUnion, who is joining the Spring Labs Board of Directors. The ability to securely exchange information without revealing the underlying data and identity of network participants creates opportunities for our customers and the consumers they serve through sharing of historically siloed data.

Spring Labs is revolutionizing the way consumer financial data is stored and shared among financial services institutions with a network foundation known as the Spring Protocol. This privacy-preserving information exchange returns control and value to data owners, unlocking new data sources and enabling competitively sensitive parties to collaborate for the common good.

Spring Labs advanced cryptography allows strict control of information visibility, and its permissioned blockchain provides a time-stamped, immutable record and audit trail. This approach offers a rare combination of transparency and privacy, uniquely suited to data exchanges in instances where participants may be concerned about sharing with competitors. For example, lenders can exchange information to identify fraud or verify identities without disclosing underlying data.

We are thrilled to announce TransUnions investment and related cooperation agreement. With tens of thousands of customers, TransUnion is the ideal partner for Spring Labs as a respected global information and insights company that shares our commitment to stewarding sensitive data. We see multiple avenues for collaboration, including the extension of our products, services and network to TransUnions customers, said Adam Jiwan, co-founder of Spring Labs. Additionally, by joining our Board, Steve will help drive continued growth for Spring Labs through his deep understanding of the business, data and analytics needs of Financial Services and other industries.

At the core of this relationship, TransUnion will help expand existing Spring Labs networks to new organizations, as well as develop new networks based on customer needs and interests.

Our core promise is to make trust possible between businesses and consumers, said Marko Ivanov, Senior Vice President at TransUnion and Spring Labs partnership lead. Spring Labs resolves the challenge of information sharing among competitors without inhibiting competition, while providing regulatory transparency and protecting consumer privacy. In addition, the flexibility and ease of integration of the Spring Protocol will enable rapid design and deployment of new networks in numerous industries across multiple use cases including credit risk, fraud and marketing. We are excited about the possibilities.

Spring Labs recently demonstrated the potential of its technology by deploying a network for data sharing among Property Assessed Clean Energy (PACE) financing providers, launched in Q4 2020. Network participants estimate it could save up to $10 million in fraud or 1% of total industry loan transactions.

About TransUnion (NYSE: TRU)TransUnion is a global information and insights company that makes trust possible in the modern economy. We do this by providing a comprehensive picture of each person so they can be reliably and safely represented in the marketplace. As a result, businesses and consumers can transact with confidence and achieve great things. We call this Information for Good.

A leading presence in more than 30 countries across five continents, TransUnion provides solutions that help create economic opportunity, great experiences, and personal empowerment for hundreds of millions of people.

http://www.transunion.com/business

About Spring LabsSpring Labs creates and oversees anonymous, decentralized data networks that vastly increase the amount, quality, and security of information available to market participants. Spring Labs leverages sophisticated cryptographic tools and blockchain technology to provide data and metadata integrity guarantees, tamper-evident workflows, and privacy-preserving tokenization that allow for the corroboration of information without the exchange of underlying data. These interlocking technologies help mitigate fraud, improve verification capabilities, and securely provide access to previously unavailable data in the financial services industry. Based in Marina Del Rey, California, Spring Labs was founded in 2017 by Adam Jiwan, John Sun, and Anna Fridman. Spring Labs has approximately 50 employees and prior to the current funding round has raised over $38m from investors including GreatPoint Ventures, August Capital, GM Ventures, and others. Learn more at http://www.springlabs.com.

Press ContactsSpring Labs:

- Otto Pohl, otto@corecommunicationsconsulting.com - Daniel Mason, daniel@springlabs.com

TransUnion:

- Dave Blumberg, david.blumberg@transunion.com, 312-972-6646

Continued here:
TransUnion and Spring Labs Partner to Transform the Exchange of Sensitive Data - GlobeNewswire

Increasing Risk of Privacy Leakage in the Post-Pandemic Era, PlatON: Privacy Computing is the Solution – StreetInsider.com

Get inside Wall Street with StreetInsider Premium. Claim your 1-week free trial here.

Singapore, Singapore--(Newsfile Corp. - April 21, 2021) - After the outbreak of COVID-19, the risk of privacy leakage is increasing. At the beginning of 2020, the sudden outbreak of the COVID-19 pandemic brought a huge impact on everyone's work and life. On the one hand, the working-from-home scenario has pushed the development of digital office. Many companies have had to transfer the materials and assets from offline to online within a short time. On the other hand, to meet the demands of the public health and pandemic control, personal health data is collected and processed digitally to be used in areas like pandemic prevention and control, health services, and tracing inquiries. For instance, travel health codes have been used in countries like China and Spain for COVID-tracing, and many countries around the world have provided the online services of test appointment and test results inquiries. The outbreak of the COVID-19 pandemic has inspired people to rethink the construction and development of infrastructures. The large scale of data transmission and exchange during the pandemic period requires the support from new technologies. In the global context, in order to adapt to the ever-increasing demand for data exchange and promote the digitalization process, many countries have prioritized and invested on cutting-edge technologies like 5G, Big Data, Artificial Intelligence, Cloud Computing, etc.

Considering the abnormal conditions of the pandemic, it can be understood and accepted to a certain extent if the data is used by relevant agencies and organizations. In spite of this, after the pandemic, when the life is back to normal, can the data privacy be properly protected in the daily data collection, storage and computing? Can the basic rights of users be properly protected? With the development of the new technologies, when a large amount of data is collected, transmitted, analyzed and processed from the end devices through Internet of Things (IoT) and 5G technologies, the risk of data breaching will increase accordingly. In this case, how can effective protection of data privacy be attained?

- Privacy computing paves the road

Fingerprint recognition, face recognition, voice recognition and other technologies collect user information to provide users with convenient and efficient services, while also putting these basic personal data information at risk of being leaked and abused. With the successive promulgation and implementation of the European Union's GDPR and California's CCPA Act, it is necessary for relevant parties to reflect their attitudes and operations towards data resources. In this context, Privacy Computing technology has gradually caught researchers' attention.

Privacy Computing refers to a type of information security technology based on modern cryptography, which is represented by technologies like Secure Multi-Party Computing (MPC), Homomorphic Encryption, Zero-Knowledge Proof, Differential Privacy, and Trusted Execution Environment (TEE), etc. Privacy Computing can realize the data computing and analysis while ensuring the security and privacy of the source data.

So far, three major technologies are available to achieve Privacy Computing: Cryptography, Trusted Execution Environment, and Federated Learning. Among them, the privacy protection scheme based on cryptography is a type of computing method that protects private information throughout the entire life cycle, and supports operations such as analysis and computing without the data itself leaking to a third party. Its core concept is to form a set of symbolic, formulaic and quantitative evaluation criteria for Privacy Computing theory when processing information flow.1 Compared with the problems brought by the traditional end-to-end encryption methods on the key management and performance impact, Privacy Computing can fundamentally protect data from the entire life cycle. In large-scale public infrastructure, the introduction and deployment of Privacy Computing support systematic data privacy protection.

At present, in addition to the in-depth research on Privacy Computing in the academia, the realistic application scenarios and large-scale commercial solutions of Privacy Computing are also being actively explored by the industry. Take PlatON Network as an example. PlatON has been developing and researching the field of Privacy Computing since 2016. The AI network of Privacy Computing provided by PlatON is a solution for privacy contract implementation based on cryptographic algorithms such as Secure Multi-Party Computing (MPC). In general, the Privacy Computing algorithm is released through the contract. The data provider and the computing nodes that require privacy protection need to cooperate to execute the MPC protocol, in order to realize the collaborative data computing. In this case, data privacy is protected at the same time when data is shared, allowing users to obtain the economic benefits of data reuse while maintaining data ownership.

After the era of the pandemic, Artificial Intelligence (AI) also has caught privacy issues during the process of data reuse. The development of AI technology turns data into a special asset, and its scale can affect both the model accuracy and the reliability of the services, which in turn affects business costs and risks. From the perspective of improving the accuracy of the AI model, the more data collected, the better the model performs, but the collection of large amounts of data also brings higher risks of privacy exposure. If AI is planned be applied in large-scale commercial scenarios, privacy is a crucial issue that cannot be bypassed.

Privacy Computing technology is born to be suitable for solving the privacy flaws of AI technology. A large amount of data is computed in an encrypted way, which not only solves the privacy problem in the traditional AI model, but also ensures the efficient data management and utilization. Considering the user's personal health IoT data involved in this pandemic as an example, PlatON's "DataBank" product can effectively protect the core data and provide lifecycle data-management services. Working as a data asset value-trading platform, PlatON's "DataBank" product can guarantee the privacy and security of personal health data during the verification and transmission process based on Privacy Computing technology. With the AI technology introduced in PlatON's "DataBank" product, multi-source and multi-mode local joint verification can be efficiently achieved. The results from Privacy Computing can provide accurate delivery services among organizations and agencies, which not only addresses the issue of mutual recognition between different regions, but also supports the sharing of data marketing channels among various agents. In this case, it can jointly improve the accuracy of health data verification, and help industries realize and establish public health economic data services under the rapid development of 5G, Cloud Computing and other technologies for digitization. As the pioneer in privacy protection area, PlatON has researched Privacy Computing technologies for many years. The Privacy Computing network infrastructure developed by PlatON can guarantee the secure and free data flow across every corner of the world. All types of Applications, relying on the data exchange and data computing as the core capability, can enjoy the convenience brought by global data collaboration and computing power sharing on PlatON.

References

[1] Li, F., H. Li, Ben Niu and J. Chen. "Privacy Computing: Concept, Computing Framework and Future Development Trends." IACR Cryptol. ePrint Arch. 2018 (2018): 1145.

[2] Sun Lilin: How to protect personal privacy to the utmost extent in pandemic prevention and tracing control (in Chinese), https://mp.weixin.qq.com/s/gwiZyfdTC6tEk83VfpnBtQ

[3] Scientists have something to say series: From 5G rich news and health code, talk about whether new infrastructure and data privacy may not be available at the same time (in Chinese),https://mp.weixin.qq.com/s/0UVaXxOCTwVbQ8dyDxpbAQ

Contact:PlatON NetworkKiki.Chen+85 15366051075kiki.chen@latticex.foundationhttps://platon.network/en

To view the source version of this press release, please visit https://www.newsfilecorp.com/release/81152

Go here to read the rest:
Increasing Risk of Privacy Leakage in the Post-Pandemic Era, PlatON: Privacy Computing is the Solution - StreetInsider.com

PQShield publishes white paper series to educate business leaders on the quantum threat to information security – PRNewswire

LONDON and OXFORD, England, Feb. 17, 2021 /PRNewswire/ -- PQShield, the cybersecurity company specialising in post-quantum cryptography, has today published a series of white papers explaining the quantum threat to information security and outlining the solutions that will help organisations to protect their sensitive information for the future.

When full-scale quantum computers arrive, they will be able to break the public-key encryption widely relied on to protect sensitive data, accessing all digital information - past, present and future. Knowing the sheer scale of the quantum security threat, engineers and scientists around the world have been working to develop a new generation of encryption - post-quantum cryptography - that will enable organisations to protect their sensitive data now and for years to come.

Based in Oxford, PQShield is helping businesses prepare for the quantum threat, pioneering the development and commercial roll-out of advanced, quantum-ready cryptographic solutions for hardware, software and communications. With one of the UK's highest concentrations of cryptography PhDs outside academia and the classified sector, the PQShield team is a leading contributor to NIST's post-quantum cryptography standardisation project, now in its concluding stages, having contributed two of the seven finalist algorithms.

Designed to educate and inform security and technical teams across every type of organisation, the new white paper series covers three topics:

To read more, visit: https://pqshield.com/quantum-threat/

About PQShield

PQShield is a cybersecurity startup that specialises in post-quantum cryptography, protecting information from today's attacks while readying organisations for the threat landscape of tomorrow. It is the only cybersecurity company that can demonstrate quantum-safe cryptography on chips, in applications and in the cloud. Headquartered in Oxford, its quantum-secure cryptographic solutions work with companies' legacy systems to protect devices and sensitive data now and for years to come. PQShield is principally backed by Kindred Capital, Crane Venture Partners, Oxford Sciences Innovation, and InnovateUK.

http://www.pqshield.com

Press contact: [emailprotected]

SOURCE PQShield

.

Go here to read the rest:
PQShield publishes white paper series to educate business leaders on the quantum threat to information security - PRNewswire

Quantum Cryptography Market Outlook 2021: Big Things are Happening | Quintessence Labs Pty Ltd., 1QBit Information Technologies, River Lane Research ,…

iCrowdNewswire Feb 15, 20218:00 AM ET

Global Quantum Cryptography Market Size study, by Offering (Solutions, Services) by Application (Network Security, Application Security, Database Security) by End User (IT & Telecommunications, BFSI, Government & Defense, Healthcare, Others) and Regional Forecasts 2020-2027 , Covid 19 Outbreak Impact research report added by Report Ocean, is an in-depth analysis of market characteristics, size and growth, segmentation, regional and country breakdowns, competitive landscape, market shares, trends and strategies for this market. It traces the markets historic and forecast market growth by geography. It places the market within the context of the wider Quantum Cryptography market, and compares it with other markets., market definition, regional market opportunity, sales and revenue by region, manufacturing cost analysis, Industrial Chain, market effect factors analysis, Quantum Cryptography market size forecast, market data & Graphs and Statistics, Tables, Bar &Pie Charts, and many more for business intelligence. Get complete Report (Including Full TOC, 100+ Tables & Figures, and Chart). In-depth Analysis Pre & Post COVID-19 Market Outbreak Impact Analysis

Download Free Sample Copy of Quantum Cryptography market Report @

https://www.reportocean.com/industry-verticals/sample-request?report_id=bw1072

Global Quantum Cryptography Market is valued approximately at USD 142.53 million in 2019 and is anticipated to grow with a healthy growth rate of more than 38.2% over the forecast period 2020-2027. Quantum Cryptography incorporates the application of physics data with an objective to develop a cryptosystem that is not easily exploitable. It is an type of coding in which the program writer coverts math to physics for higher security reasons. Quantum cryptography aims at the fortification of data or the valuable information of the association from hackers or code breakers. Quantum Key distribution (QKD) is an enormously popular cryptographic application. It includes encoding and sending the needed information for decryption. The Quantum cryptography market is chiefly driven owing to surging cyber-attacks incidents in the trending era of digitalization and escalating cyber security funding by both public and private organizations. As in March 2018, SamSam ransomware cyberattack was activated in Atlanta, US. The cyberattack consisted guesstimating weak passwords and encrypting files leading to data leakage and financial losses. Hence the rising cases of cyberattacks drive the market towards growth. Also, as in April 2020, the government of India, collaborated with the Data Security Council of India (DSCI) to establish a national center of excellence with an aim to increase innovation in the Indian cybersecurity market. Furthermore, rising demand for next-gen security solutions and surging need for integrations solutions in the business world fuels the market growth. However, lack of skilled expertise impedes the growth of the market over the forecast period of 2020-2027.

The regional analysis of global Quantum Cryptography market is considered for the key regions such as Asia Pacific, North America, Europe, Latin America and Rest of the World. North America is the leading/significant region across the world in terms of market share owing to the high adoption of advanced technology in the region coupled with increased demand for high security and integrated solutions. Whereas, Asia-Pacific is also anticipated to exhibit highest growth rate / CAGR over the forecast period 2020-2027. Factors such as rising digitalization coupled with increasing investments in increasing security would create lucrative growth prospects for the Quantum Cryptography market across Asia-Pacific region.

The objective of the study is to define market sizes of different segments & countries in recent years and to forecast the values to the coming eight years. The report is designed to incorporate both qualitative and quantitative aspects of the industry within each of the regions and countries involved in the study. Furthermore, the report also caters the detailed information about the crucial aspects such as driving factors & challenges which will define the future growth of the market. Additionally, the report shall also incorporate available opportunities in micro markets for stakeholders to invest along with the detailed analysis of competitive landscape and product offerings of key players. The detailed segments and sub-segment of the market are explained below:

Key Segments Studied in the Global Quantum Cryptography Market

Professional Key players:

ID Quantiques SA

Anhui Qasky Science and Technology Ltd

MagiQ Technologies

Quintessence Labs Pty Ltd.

1QBit Information Technologies

River Lane Research

Accenture Plc

Interuniversity Microelectronics Centre (Imec)

Airbus SE

Aliyun / Alibaba Cloud

Market Segmentation:

Global Quantum Cryptography Market Size study, by Offering (Solutions, Services) by Application (Network Security, Application Security, Database Security) by End User (IT & Telecommunications, BFSI, Government & Defense, Healthcare, Others) and Regional Forecasts 2020-2027

Regional Scope: North America, Europe, Asia Pacific, Oceania, South America, Middle East & Africa

Segments Covered:

Product Types, Applications, End-Users, Regions, Top Companies and more.

A combination of factors, including COVID-19 containment situation, end-use market recovery & Recovery Timeline of 2020/ 2021

covid-19 scenario

Market Behavior/ Level of Risk and Opportunity

End Industry Behavior/ Opportunity Assessment

Expected Industry Recovery Timeline

Business Impact Horizon

Opening of Economy by Q3 2020

xx

xx

xx

xx

Recovery Opening of Economy extended till Q4 2020 / Q1 2021

xx

xx

xx

xx

Geographical Breakdown: The regional and country breakdowns section gives an analysis of the market in each geography and the size of the market by geography and compares their historic and forecast growth. It covers the impact and recovery path of Covid 19 for all regions, key developed countries and major emerging markets.

Country Level Break-Up:United States, Canada, Mexico, Brazil, Argentina, Colombia, Chile, South Africa, Nigeria, Tunisia, Morocco, Germany, United Kingdom (UK), the Netherlands, Spain, Italy, Belgium, Austria, Turkey, Russia, France, Poland, Israel, United Arab Emirates, Qatar, Saudi Arabia, China, Japan, Taiwan, South Korea, Singapore, India, Australia and New Zealand etc.

In-Depth Qualitative COVID 19 Outbreak Impact Analysis Include Identification And Investigation Of The Following Aspects:The research includes the key strategic activities such as R&D plans, M&A completed, agreements, new launches, collaborations, partnerships & (JV) Joint ventures, and regional growth of the key competitors operating in the market at global and regional scale.

Key Market Features in COVID-19 Outbreak:

The report highlights market features, including revenue, weighted average regional price, capacity utilization rate, production rate, gross margins, consumption, import & export, supply & demand, cost bench-marking, market share, CAGR, and gross margin.

Market Highlights & ApproachThe report provides the rigorously studied and evaluated data of the top industry players and their scope in the market by means of several analytical tools. The analytical tools such as Porters five forces analysis, feasibility study, SWOT analysis, and ROI analysis have been practiced reviewing the growth of the key players operating in the market.

(Check Our Exclusive Offer: 30% to 40% Discount)

https://www.reportocean.com/industry-verticals/sample-request?report_id=bw1072

Key questions answered: Study Explore COVID 19 Outbreak Impact Analysis

Q.1 What are some of the most promising potential, high growth opportunities for the global market by application, by product, by end user and by region (North America, Europe, Asia Pacific, and the Rest of the World)?

Q.2 Which segments will grow at a faster speed and why?

Q.3 Which regions will grow at a faster speed and why?

Q.4 What are the key factors affecting market dynamics? What are the drivers and challenges of the market?

Q.5 What are the business risks and threats of market?

Q.6 What are emerging trends in market and the reasons behind them?

Q.7 What are some changing demands of customers in the market?

Q.8 What are the new developments in the market? Which companies are leading these developments?

Q.9 Who are the leading players in market? What strategic initiatives are being implemented by key players for business growth?

Q.10 What are some of the competitive products and processes in this market?

Q.11 What M & A activities have taken place in the last five years in this market?

The Study Explore COVID 19 Outbreak Impact Analysis

Ask Our Expert for Complete Report@:

https://www.reportocean.com/industry-verticals/sample-request?report_id=bw1072

Key Points Covered in Quantum Cryptography Market Report:

Chapter 1 COVID-19 Outbreak-Global Quantum Cryptography Market Business OverviewChapter 2 Major Breakdown by Type Chapter 3 Major Application Wise Breakdown (Revenue & Volume)Chapter 4 Manufacture Market BreakdownChapter 5 Sales & Estimates Market StudyChapter 6 Key Manufacturers Production and Sales Market Comparison Breakdown..Chapter 8 Manufacturers, Deals and Closings Market Evaluation & AggressivenessChapter 9 Key Companies Breakdown by Overall Market Size & Revenue by Type..Chapter 11 Business / Industry Chain (Value & Supply Chain Analysis)Chapter 12 Conclusions & Appendix

..and view more in complete table of Contents

Browse Premium Research Report with Tables and Figures at @ https://www.reportocean.com/industry-verticals/sample-request?report_id=bw1072

Thanks for reading this article; you can also get individual chapter wise section or region wise report version like North America, Europe or Asia.

About Report Ocean:

We are the best market research reports provider in the industry. Report Ocean believe in providing the quality reports to clients to meet the top line and bottom line goals which will boost your market share in todays competitive environment. Report Ocean is one-stop solution for individuals, organizations, and industries that are looking for innovative market research reports.

Report OceanEmail: [emailprotected]Address: 500 N Michigan Ave, Suite 600, Chicago, IIIinois 60611 UNITED STATESTel: +1 888 212 3539 (US TOLL FREE)Website: https://www.reportocean.com/Blog: https://reportoceanblog.com/

Keywords:Quantum Cryptography Market, Quantum Cryptography Market Analysis, Quantum Cryptography Market Growth, Quantum Cryptography Market Scope, Quantum Cryptography Market Share, Quantum Cryptography Market Trend, Quantum Cryptography Market Development, Quantum Cryptography Market Sales, Quantum Cryptography Market Forecast, Quantum Cryptography Market Opportunities, Quantum Cryptography Market Size

More:
Quantum Cryptography Market Outlook 2021: Big Things are Happening | Quintessence Labs Pty Ltd., 1QBit Information Technologies, River Lane Research ,...

What is MTA-STS and How Does It Protect Your Emails? – MakeUseOf

Email is the biggestculprit behind most cyberattacks.It is an easy access point formalware, adware, spam, and phishing, and providesinfinite opportunities for threat actors to get hold of yourpersonalinformation.

To mitigate these threats, stringent security measures should be in place for both individual and business email accounts.

Despite the popularity of other modes of communication, email messaging is still the largest form of data in transit for any individual or organization. Securingyour email contents is avital necessity.

Email security entails the inspection and encryption of all incoming and outgoing email traffic. Encryption plays a vital role in keeping the privacy of email contents intact by ensuring secure SMTP (Simple Mail Transfer Protocol) connections.

Until recently, encryption was only an optional requirement for SMTP.

Email encryption is a process of adding a cipher or piece of code to yourmessage content making it indecipherable. By converting email data into code, the contents are protected from unauthorized exposure. Simply put, your email is scrambled.

As an added security, the encryption process utilizes public and private keys where encrypted keys are exchanged to lock and unlock the coded emails. The sender encrypts the email using public-key cryptography and subsequently, the recipient uses a private key to decipher the received message.

Encryption is applied to the entire journey of an email, from start to finish. As abest practice, all inbound and outbound emails should be encryptednot just the ones carrying sensitive information. This prevents the threat actors from gaining any entry point into your system.

When the SMTP protocol came into existence in 1982, email encryption was not a common practiceand by default, emails were sentand received in plain text. To introduce security at the transport level, the STARTTLS command was added in the late 1990s, which offered the encryption option through the TLS (Transport Layer Security) protocol.

As promising as the TLS upgrade sounded, it lefttwo security loopholes intact:

In 2019, Google finally stepped up to the plate andannounced the adoption of the new MTA-STS (Mail Transfer Agent/Strict Transport Security) standard(RFC8461).

Thisgives the mail service providers the ability to impose TLS for securing SMTP connectionsand also offers the option to deny email delivery to MX hosts that do not offer TLS with a reliable server certificate.

MTA-STS finally takes care of all the previous issues with SMTP by enforcing encryption between the communicating SMTP servers. But how does it actually work? Let's find out!

MTA-STS goes to work by instructing an SMTP server to only communicate with another SMTP server on two conditions:

By using a combination of DNS and HTTPS to publish a policy, MTA-STS informs the sending party how to proceed if an encrypted channel of communication cannot be initiated.

It's easy to implement MTA-STS on the recipient'send but for the sender, a supporting mail server software such as ProtonMailshould be used.

Related:ProtonMail: The Email Security You Need With the Features You Want

The following threats are met head-on if MTA-STS is applied to your email communications:

Man-In-The-Middle (MITM) Attacks:This attack is carried outwhen an attacker intercedesthemselves in the middle of communication between two parties to steal or alter data. In the case of an email, that would typically mean two communicating SMTP servers. By employing MTA-STS, these attacks can be easily prevented.

Downgrade Attacks:A threat actor forces a network channel to change to an insecure data transmission mode. As an example, this attack might redirect a website visitor from an HTTPS version of a site to an HTTP version. MTA-STS helpscombat these attacks by preventing any unauthorized access.

DNS Spoofing Attacks: These cunning attacks change the DNS records of a user's intended destination and fools them into believing that they are visiting a legitimate site or domain. Implementing MTA-STS greatly helps in mitigating these attacks.

Related:What Is DNS Cache Poisoning?

Now that we are familiar with the MTA-STS, it is time to touch base with a new reporting standard for SMTP known as TLS reporting.

Just like MTA-STS, TLS-RPT is a reporting standard that detects connectivity issues and discrepancies between sending applications. Once enabled, it sends daily reports regarding any connection problemsexperienced by external servers while sending you emails.

Think of it as a troubleshooting tool where the reports can be used to gauge and triage potential problems and configuration issues.

Diagnostic Reporting:TLS reporting offers diagnostic reports in JSON file format containing comprehensive details regarding any inbound emails facing delivery issues. It also detects emails that bounced or did not deliver due to a downgrade attack, for instance.

Improved Visibility: By enabling TLS-RPT, you can improve visibility on all your email channels. This allows you to keep an eye on all the data that is heading your way, which also includes failed messages.

Daily Reports: The diagnostic reports are sent at least once a day to cover and observe the MTA-STS policies in depth. The reports also include traffic statistics as well as detailed information on errors and failed deliveries.

Due to the continuously evolving nature of cyber threats, stringent security measures and cryptography are must-haves for safe and secure email delivery.

Thanks to the various email providers offering strong encryption capabilities and the MTA-STS standards, fullysecure email transfers are not a far-fetched reality anymore.

Fed up with government and third-party surveillance of your emails? Protect your messages with a secure encrypted email service.

Kinza is a technology enthusiast, technical writer, and self-proclaimed geek who resides in Northern Virginia with her husband and two kids. With a BS in Computer Networking and numerous IT certifications under her belt, she worked in the Telecommunications industry before venturing into technical writing. With a niche in cyber-security and cloud-based topics, she enjoys helping clients meet their diverse technical writing requirements across the globe.In her spare time, she enjoys reading fiction, technology blogs, crafting witty children's stories, and cooking for her family.

Join our newsletter for tech tips, reviews, free ebooks, and exclusive deals!

Please confirm your email address in the email we just sent you.

Visit link:
What is MTA-STS and How Does It Protect Your Emails? - MakeUseOf