We need to build a quantum security coalition. Here’s why… – Quantaneo, the Quantum Computing Source

The power of quantum computers creates an unprecedented threat to the security of our data through its potential to break the cryptography that underpins our digital ecosystem. The technology community can address and manage this risk that has the potential to act as a strategic blocker to the wider adoption of Quantum technology; doing so will help unlock the trillion-dollar potential value of quantum technology to the global economy.

For all the dramatic advances they will offer, quantum computers could threaten our ability to encrypt information and exchange it securely. While this development has the potential for significant economic and geopolitical disruption, the technology to mitigate this risk exists today and it also presents a transformative opportunity to deliver a new level of digital trust and security.

What the world needs is a quantum security coalition, a global community of those who are committed to promoting the safe and secure adoption of new quantum applications, promoting better quantum literacy among global leaders, and accelerating a secure global ecosystem, including quantum security technology, that will be able to unlock the true value and potential of this technology securely.

Quantum security principles

Quantum science is now being harnessed to build a strong cybersecurity response to both a future as well as the current threat landscape. The resultant technologies can provide the basis for a new security foundation that will offer a step-change in our ability to secure our digital infrastructure but we need action now to incentivize their widespread adoption across the digital ecosystem.

Leveraging the laws of physics, quantum-enabled technologies, such as quantum key distribution and quantum random number generation, are not susceptible to attacks from either quantum computers or powerful mathematical techniques. As such they can provide robust and future-proof security and potentially a new paradigm of trust not currently available using traditional approaches.

These physics-based approaches, based on advanced cybersecurity software and next-generation cryptographic strategies (known as post-quantum algorithms), deliver resilient cybersecurity infrastructure capable of safeguarding our digital lives and connected societies today and into the future. Quantum-enabled technologies form the core of the quantum principles that can be employed to assure the security of digital communications. The following examples of potential applications will play a critical role in building trust in the digital ecosystem.:

1. Quantum key distribution technology uses quantum effects to protect the most critical and vulnerable link in the security chain: the exchange of encryption keys between parties. The diagram below illustrates a quantum key distribution system using an optical fibre-based channel to exchange key material, protected by the laws of quantum physics. Adaptations to other channels such as 'over-the-air' quantum key distribution are also maturing.

2. Quantum effects can also be harnessed to deliver high-speed streams of truly random (known as full entropy) bits, which can be used to construct high-quality encryption keys. By virtue of being truly random, and thus unpredictable, such keys are more secure. Devices capturing these quantum effects are now mature and are today being deployed in existing technology and infrastructure.

The importance of entropy in security is well illustrated by cautionary tales of what has happened when too much reliance has been placed on deterministic or algorithmic approaches to generating random numbers.

In 2017, Russian hackers cheated casinos out of millions of dollars by targeting weak (software-based) pseudo-random number generation algorithms in slot machines. They used smartphones to record the patterns of the spins of slot machine wheels and then reverse-engineered the underlying random number-generation algorithm. This enabled the hackers to predict the spins and monetize this predictability. As a consequence, the gaming industry has been one of the first to start realizing the potential power of quantum-enabled true random number generation.

Building a quantum security coalition

The foundations of this new security paradigm are firmly in place; however more work is needed to drive broad adoption. This is a new technology, and within the security ecosystem progress is being made within the academic, innovation labs and specialist technical communities. But within the security field we see two main barriers that the wider community needs to address:

Barrier 1: Maturity and standards

While quantum entropy is a known, highly capable technology for generating encryption keys that is also ready for broad implementation, there still remain barriers to the deployment of other components of the quantum principles, specifically post-quantum algorithms and quantum key distribution. This includes determining which of the proposed post-quantum algorithms will provide the most robust and durable security while minimizing operational impacts and costs. Similarly, there are multiple different types of quantum key distribution under development that meet a range of needs, and potentially causing confusion among early adopters.

Barrier 2: Building the quantum security ecosystem

Currently, there is a major gap in both awareness of and information about the potential applications, risks and security solutions associated with quantum technology. For leaders charged with ensuring the security and integrity of the systems on which businesses rely, there is still hyperbole in the quantum security debate. The community can change this by building quantum literacy at the board and CEO level. This will require actions at the individual as well as the collective leadership level from gaining an inventory of information assets (including shared infrastructure) and developing a comprehensive understanding of risks potentially impacted by quantum technology to building a roadmap identifying key milestones and trigger events.

In parallel, this technology transition requires the urgent development of a pipeline of professionals to implement these principles effectively. The quantum security market alone is expected to grow to globally to $25 billion in just a few short years. The community needs to start investing in skills and the supply ecosystem must start preparing for a quantum-enabled safe and digitally secure posture. The acceleration of government-led initiatives such as those announced in the US, EU, India, Japan, and Australia will also help.

Securing our quantum future

It is imperative that the cybersecurity community begins to build and accelerate its adoption of quantum security technology, and to move its value from the technical to the transformative space. This emerging technology is already being implemented to build a strong cybersecurity response to the potential cryptographic threat, but these new quantum-enabled technologies provide the basis for a new security foundation that will offer a step-change in our ability to secure digital infrastructure.

Vikram Sharma, Founder and Chief Executive Officer, QuintessenceLabs William Dixon, Head of Future Networks and Technology, World Economic Forum

Read this article:
We need to build a quantum security coalition. Here's why... - Quantaneo, the Quantum Computing Source

Tozny is Named a 2020 Hot Vendor by Aragon Research – PRNewswire

PORTLAND, Ore., Aug. 18, 2020 /PRNewswire/ --Tozny, the leader in end-to-end encrypted identity management, today announced it has been included in the 2020 Hot Vendors Security and Privacy report by Aragon Research. The Hot Vendor list recognizes "noteworthy, visionary, and innovative vendors."

Jim Lundy, founder and CEO of Aragon Research, and author of the 2020 Hot Vendors in Security and Privacy report says, "What makes Tozny hot is its comprehensive and innovative cryptographic solution for security and privacy." Tozny's suite of end-to-end encrypted solutions ensure that no matter where data goes, it is always protected.

The recent launch of TozID, an end-to-end encrypted identity management system, adds robust access controls for customer and workforce identity management to the company's portfolio. All of Tozny's products are compliant with the major regulatory standards such as HIPAA, GDPR, CCPA, and PIPEDA, which offers clients peace of mind and helps organizations limit costs in the event of a breach.

"We are pleased to be included in Aragon Research's list of Hot Vendors for Security and Privacy," said Isaac Potoczny-Jones, Tozny's Founder and CEO. "Tozny's inclusion in this year's report underscores the importance of data privacy in a largely remote world. Our innovative identity management platform, TozID, is a cutting edge system built around end-to-end encryption so that data security is first, not last."

About Tozny: Tozny delivers Identity Management and Data Privacy solutions as a service and via SDKs to easily protect businesses, workforces, and individuals against data breaches and security threats. Built with technology developed for NIST and DARPA-funded projects, Tozny brings the world's most secure encryption solutions to all businesses that require secure, compliant applications that people can trust. Tozny was founded by leading cryptography experts from security research firm Galois in 2013. Visit https://tozny.com/tozid to learn more.

Contact: John Wolcott 844-628-2872

SOURCE Tozny LLC

Home

View post:
Tozny is Named a 2020 Hot Vendor by Aragon Research - PRNewswire

Quantum Cryptography Market: Business Opportunities, Current Trends, Market Forecast and Global Industry Analysis by 2026 – Owned

Los Angeles, USA: This research report classifies the global Quantum Cryptography market in terms of top players/brands, region, type, and end-user. This report also studies the global Quantum Cryptography market structure, growth rate, growth drivers, future trends, market drivers, challenges, barriers, opportunities, sales channels, distributors and competition.

Download PDF brochure consist of Table of Content, Research Framework, and Research Methodology.Get Free PDF Brochure:-https://www.coherentmarketinsights.com/insight/request-pdf/1192

Quantum Cryptography Market Research Report presents a detailed analysis based on the thorough research of the overall market, particularly on questions that border on the market size, growth scenario, potential opportunities, operation landscape, trend analysis, and competitive analysis of Quantum Cryptography Market. This research is conducted to understand the current landscape of the market, especially in 2018. This will shape the future of the market and foresee the extent of competition in the market. This report will also help all the manufacturers and investors to have a better understanding of the direction in which the market is headed.

Major PlayersOperating in this market include Magiq Technologies, Inc., Quintessencelabs, Nucrypt LLC, Qutools GmbH, Qasky, Crypta Labs Ltd, Qubitekk, Inc., PQ Solutions, Infineon Technologies AG, and Id Quantique

Important Features that are under Offering and Key Highlights of the Reports:

Detailed overview of Market

Changing market dynamics of the industry

In-depth market segmentation by Type, Application etc.

Historical, current and projected market size in terms of volume and value

Recent industry trends and developments

Competitive landscape of Quantum Cryptography Market

Strategies of key players and product offerings

Potential and niche segments/regions exhibiting promising growth

Get Discount on This Report:https://www.coherentmarketinsights.com/insight/request-discount/1192

With this Quantum Cryptography market report, all the participants and the vendors will be in aware of the growth factors, shortcomings, threats, and the lucrative opportunities that the market will offer in the near future. The report also features the revenue; industry size, share, production volume, and consumption in order to gain insights about the politics and tussle of gaining control of a huge chunk of the market share.

For each geographical region, the market potential is analyzed with respect to the growth rate, consumer buying patterns, demand, and present scenarios, macroeconomic parameters in the industry. The industry existence and maturity analysis will lead to investment feasibility and development scope. The report offers the market growth rate, size, and forecasts at the global level.

The main points which are answered and covered in this Report are-

What will be the total market size in the coming years till 2026?

What will be the key factors which will be overall affecting the industry?

What are the various challenges addressed?

Which are the major companies included?

Which geography will grow at a faster rate and why?

Request Discountoption enables you to get the discounts on the actual price of the report. Kindly fill the form, and one of our consultants would get in touch with you to discuss your allocated budget, and would provide discounts.

Apply promocodeCMIFIRST1000save1000USDand alsoget onepremium report sample Copy FREE

Buy-Now this Research Report @https://www.coherentmarketinsights.com/insight/buy-now/1192

Worlds Major Regions Covered:

North America: United States, Canada, Mexico

Asia-Pacific: China, India, Australia, Japan, South Korea, Indonesia, Malaysia, Philippines, Thailand, Vietnam

Middle East Africa: Turkey, Egypt, South Africa, GCC Countries, Rest of Middle East & Africa

Europe: Germany, France, UK, Russia, Italy, Rest of Europe

Central & South America: Brazil, Rest of South America

Reasons for Buying This Report:

It Provides A Forward-Looking Perspective on Different Factors Driving or Restraining Market Growth.

It Provides A Five-Year Forecast Assessed on The Basis of How the Market Is Predicted to Grow

It Helps in Understanding the Key Product Segments and Their Future.

It Provides Pin Point Analysis of Changing Competition Dynamics and Keeps You Ahead of Competitors.

It Helps in Making Informed Business Decisions by Having Complete Insights of Market and By Making an In-Depth Analysis of Market Segments.

The assessment of the winning strategies followed by these companies can help Quantum Cryptography industry not only strategize but also execute industry operations by referring to the statistics about competitor analysis. The valuation of the Quantum Cryptography industry analysis across different regions along with vital information on the Market size, share and growth rate makes this report a wonderful resource for business evangelists.

About Coherent Market Insights:

Coherent Market Insights is a prominent market research and consulting firm offering action-ready syndicated research reports, custom market analysis, consulting services, and competitive analysis through various recommendations related to emerging market trends, technologies, and potential absolute dollar opportunity.

Contact Us:

Mr. ShahCoherent Market Insights1001 4th Ave,#3200Seattle, WA 98154Tel: +1-206-701-6702Email:[emailprotected]Visit Here, for More Information:https://theemmasblog.blogspot.com/

See more here:
Quantum Cryptography Market: Business Opportunities, Current Trends, Market Forecast and Global Industry Analysis by 2026 - Owned

$1.5+ Billion Worldwide Quantum Cryptography Industry to 2027 – Drivers, Restraints, Opportunities and Threats – ResearchAndMarkets.com – The Baytown…

DUBLIN--(BUSINESS WIRE)--Aug 14, 2020--

The "Quantum Cryptography - Global Market Outlook (2019-2027)" report has been added to ResearchAndMarkets.com's offering.

The Global Quantum Cryptography market accounted for $137.16 million in 2019 and is expected to reach $1,586.42 million by 2027 growing at a CAGR of 35.8% during the forecast period.

Some of the key factors propelling market growth include growing incidents of cyber-attacks in the era of digitalization, increasing cybersecurity funding, rising demand of next-generation security solutions for cloud and IoT technologies and evolving next-generation wireless network technologies. However, the high implementation cost and lack of expertise are identified as key factors hindering market growth.

Quantum cryptography is a science of exploiting the quantum and using current physics knowledge in order to implement a cryptography system that is able to prevent any types of attacks on data. It is used to securely send data over network, wherein if quantum cryptography is applied to a particular data that needs to be being transferred, then only sender and receiver of data are able to access that data with the help of special key. Quantum cryptography is different as compared to traditional cryptography method, as quantum cryptography is more dependent on physics, instead of mathematics.

Companies Mentioned

What the report offers:

Key Topics Covered:

1 Executive Summary

2 Preface

3 Market Trend Analysis

3.1 Introduction

3.2 Drivers

3.3 Restraints

3.4 Opportunities

3.5 Threats

3.6 End User Analysis

3.7 Application Analysis

3.8 Emerging Markets

3.9 Impact of Covid-19

4 Porters Five Force Analysis

4.1 Bargaining power of suppliers

4.2 Bargaining power of buyers

4.3 Threat of substitutes

4.4 Threat of new entrants

4.5 Competitive rivalry

5 Global Quantum Cryptography Market, By Component

5.1 Introduction

5.2 Services

5.2.1 Deployment and Integration

5.2.2 Support and Maintenance

5.2.3 Consulting and Advisory

5.3 Hardware

5.3.1 Blade

5.3.2 Server

5.3.3 Random Number Generator

5.3.4 R&D Platform

5.4 Software

5.4.1 Transmission

5.4.2 Crypto Libraries

5.4.3 Encryption

5.4.4 Post-Quantum Cryptography

5.4.5 SDKs/APIs

5.4.6 Key & Policy Management Software

5.5 Quantum Cryptography Appliances

5.5.1 Quantum Random Number Generator (QRNG) Appliance

5.5.2 Quantum Key Generation Appliance

5.5.3 Quantum Key Distribution (QKD) Appliance

6 Global Quantum Cryptography Market, By Security Type

6.1 Introduction

6.2 Application Security

6.3 Network Security

6.4 Database Encryption

6.5 Cloud Encryption

7 Global Quantum Cryptography Market, By End User

7.1 Introduction

7.2 Commercial

7.3 Healthcare and Life Sciences

7.4 Government and Defense

7.5 Automotive

7.6 Retail & E-Commerce

7.7 Manufacturing

7.8 Medical

7.9 Commercial

7.10 Residential

7.11 Industrial

7.12 Aerospace

7.13 Other End Users

7.13.1 Logistics

7.13.2 IT and Telecom

7.13.3 Education

7.13.4 Energy and Utilities

8 Global Quantum Cryptography Market, By Organization Size

8.1 Introduction

8.2 Large Enterprises

8.3 Small and Medium Enterprises

8.4 Governing and Regulatory Bodies

9 Global Quantum Cryptography Market, By Algorithm Type

9.1 Introduction

9.2 Asymmetric key

9.3 Symmetric key

10 Global Quantum Cryptography Market, By Deployment Protocol

10.1 Introduction

10.2 BB84 protocol

10.3 TSL/SSL protocol

11 Global Quantum Cryptography Market, By Application

11.1 Introduction

11.2 Optimization

11.3 Sampling

11.4 Simulation

12 Global Quantum Cryptography Market, By Geography

12.1 Introduction

12.2 North America

12.3 Europe

12.4 Asia Pacific

12.5 South America

12.6 Middle East & Africa

13 Key Developments

13.1 Agreements, Partnerships, Collaborations and Joint Ventures

13.2 Acquisitions & Mergers

Read more:
$1.5+ Billion Worldwide Quantum Cryptography Industry to 2027 - Drivers, Restraints, Opportunities and Threats - ResearchAndMarkets.com - The Baytown...

What Toshiba’s Investment In AI And Quantum Cryptography Means For The Company – Analytics India Magazine

Having given up the nuclear project in the US, the Japanese multinational conglomerate reported an operating profit for fiscal 2019, which tripled in the year to 130.5 billion yen. At the same time, the group has dropped some core operations, including the memory chip business and emphasised back to its core strength of industrial applications using state-of-the-art technology research and development.

AI and quantum cryptography seem to be the main highlight as it is aiming to spend about 34 billion yen ($321 million) on a new R&D unit in Japan. As part of this new building complex, a part of the present R&D centre in Kawasaki, near Tokyo will be renovated for the first time after, since its inception sixty years ago.

The new unit aims to accommodate 3000 staff members who will work on various AI projects and quantum cryptography to find business applications. The construction will commence in January 2022 as per a Nikkei report and will be inaugurated in 2023. The new facility will consolidate existing projects and functions as a centre for innovation in AI.

Toshiba Corporation is the key member of a joint project of 12 Japanese organisations which aims to advance Japans quantum cryptography communication technology to the highest level globally. The project has a planned budget of 1.44 billion yen ($13 million), and Toshiba will be leading the research.

The project, commissioned and supported by Japans Ministry of Internal Affairs and Communications (MIC), will soon begin research and development of a Global Quantum Cryptography Communications Network. The partner ecosystem is expected to develop the quantum cryptographic communication technology for practical use over a large scale network consisting of 100 quantum cryptographic devices by the year 2024.

Toshiba has been working on cryptographic research for three decades, beginning in 1991 when the company built a research laboratory at Cambridge in the United Kingdom. The company has achieved feats such worlds first quantum cryptography communication at one-month-average key distribution speeds, exceeding 10 Mbps over installed optical fibre lines.

According to Toshiba, the company will develop on its recent effort to improve technologies that will enhance quantum key distribution rates by around three times. Along with that, the company is working on completing storage system security technologies that assure safe and secure maintenance and management of cryptographic key data in a distributed communication environment.

Quantum key distribution (QKD) is a cryptographic communications innovation that applies the principles of quantum mechanics to achieve completely secure communications that are almost impossible to intercept by any hackers. As a POC, the company became the first to digitally transmit complete Genome Sequence Data in a trial demonstration in Japan using quantum cryptography.

Also, Toshiba is now executing field tests with partner companies around the globe toward achieving practical use cases for the technology. It is also working to advance the integration of 5G and networking technology with quantum cryptography.

Toshiba has been carrying extensive research for various AI applications. It began with the creation of the first OCR (optical character recognition) postal code reading and sorting device which the company built in 1967. Since then, it has explored areas such as image recognition, voice recognition, translation, speech synthesis, chatbots, etc. Toshiba is currently ranked third around the world and first in Japan for a cumulative number of AI-based patent applications.

Recently, Toshiba Digital Solutions Corporation launched its Distributed Co-Simulation Platform, which included model-based development for automakers and vehicle parts suppliers. The system, VenetDCP powers digital prototyping of automotive control systems and vehicular components using AI models in a simulated environment.

The focus today is moving in the direction of fusion between the cyber and the physical. To address increasingly complex issues, we need to shift towards digital transformation. So, we need to take real-world data, analyse it in cyberspace, and utilise the results to generate new value in the real world, said Hironobu Nishikori, Executive Officer & Corporate Senior Vice President, Toshiba Corporation recently.

Toshiba has begun an AI engineering training program in collaboration with the Graduate School of Information Science and Technology at the University of Tokyo. The program provides in-depth education on AI systems from classical machine learning to the state of the art advancements in deep learning. It also utilises Toshibas real-world big data, so that trainees acquire more practical skills in AI technologies. The company currently has over 700 AI engineers, but with the latest investment, the goal is to triple this number.

Toshiba aims to become a cyber-physical systems (CPS) company. One of Toshibas Cyber-Physical System (CPS) Technology projects is the Digital Twin-based Train Planning Project with UK train company Greater Anglia. Toshiba partnered to build a more effective train timetable and enhance customer convenience. It achieved this by developing the Digital Twin of the train and accurately reproducing a real-world train environment for the digital world by embedding it with an AI system. Then the company analysed and conducted simulations under various conditions to improve the operations.

Toshiba recently built Lag-aware Multivariate Time-series Segmentation (LAMTSS), an AI that enhances the accuracy of anomaly prediction/detection and motion analysis for infrastructure and manufacturing equipment. This technology automatically corrects time lag among multiple time-series datasets obtained from sensors installed in equipment or devices.

In another instance, Toshiba created a PC-based, high-speed, high accuracy image analysis artificial intelligence system which monitors crowds by analysing the number of people in camera images by leveraging its proprietary deep learning algorithm. On the consumer side, Toshiba is researching voice and language applications for the Japanese market.

The above developments suggest that Toshiba has set an ambitious plan for AI and cryptography projects, which are going to get a significant boost with the inflow of hundreds of millions of money into these sectors.

comments

Vishal Chawla is a senior tech journalist at Analytics India Magazine and writes about AI, data analytics, cybersecurity, cloud computing, and blockchain. Vishal also hosts AIM's video podcast called Simulated Reality- featuring tech leaders, AI experts, and innovative startups of India. Reach out at vishal.chawla@analyticsindiamag.com

View original post here:
What Toshiba's Investment In AI And Quantum Cryptography Means For The Company - Analytics India Magazine

Here’s the Theme Driving the US Army’s New Communications Tech – Defense One

A common theme emerges from the U.S. Army's efforts to field several new communications technologies: for the foreseeable future, the service's comms programs are about pushing more data to and from the front lines in the face of increasingly aggressive electronic-warfare activities.

Two Army pilot programs aim to bring cloud storage closer to the front lines by fiscal 2023, say Maj. Gen. Peter A. Gallagher, the director of the Network Cross-Functional Team and Brig. Gen. Robert M. Collins, program executive officer for Command, Control, Communications-Tactical. But the two pilots approach the problem in different ways, they said Tuesday at a virtual event hosted by the Potomac Officers Club.

The goal of the first pilot, which operators have just finished testing, was to move training software from a fixed location into a cloud for use anywhere. That will come in handy as the Army deploys its new Integrated Visual Augmentation System, or IVAS: augmented-reality goggles that will allow soldiers to review and retrain on different operations theyve experienced.

The second pilot looks at virtual and container clouds basically, smaller cloud environments within larger clouds. Gallagher said the objective is to sideline data that operators use only rarely, and prioritize access to more valuable data in environments where there is a lot of jamming and hacking.

The Army has built several prototype communication tools using rapid innovation funding. Gallagher and Collins highlighted new prototypes in cryptography alternatives, as in methods for sending secure coms beyond traditional encryption, for tracking friendly military units (also in electronic warfare-heavy environments) and satellite communications tools that rely less on commercial, wideband satellite signals. Theyre also working with the services Future Vertical Lift team manned and unmanned helicopters to build wideband satellite communications gear that can operate on our platforms through rotor blades.

The Army is working with industry on prototypes for multi-orbit and multi-path (meaning in low-earth orbit, geo earth orbit, etc.) satellite communication tools, software-defined radio programs for the CMOSS standard, which refers to the modular open suite of software standards that allows for different military vehicles to share the same software platform, unified network operations, identity management, data transfer thats less hackable or jammable, and techniques for converging disparate data sources into a common fabric.

Finally, they highlighted eight technologies that have come out of the Combat Capabilities Development Command, that they described as ready for wider, experimental use in the field. Those areas include cyber situational understanding, application security, integrated tactical network operations, canceling interference for the TSM waveform, which is commonly used in tactical settings, and greater spectrum awareness so we can see what our signature looks like and take actions to mitigate against that signature.

Back in 2017, Army leaders listed communications as a top-five modernization priority. Its arguably No. 1 as it will provide the basis for sharing data between a wider array of Army robotic vehicles and device-carrying soldiers. It remains to be seen how well all of those Army pieces will connect to other services as part of the Pentagons nascent Joint All-Domain Command and Control networks.

Originally posted here:
Here's the Theme Driving the US Army's New Communications Tech - Defense One

PR.com – TRECIG Executive, Jim West, Named Among the 2020 American Cyber Awards Finalists – IT News Online

PR.com2020-08-16

Dallas, TX, August 16, 2020 --(PR.com)-- TRECIG is pleased to announce that their Chief Information Officer and Cyber Security Expert, Jim West, has been selected as a finalist in the Personality of the Year award for the 2020 American Cyber Awards. The American Cyber Awards were established to shine a spotlight on the most innovative and successful people, teams and products in cybersecurity in America. The American Cyber Awards reviews the industry, searching for those who are pushing the boundaries in the fight against cyber-crime. Mr. West was particularly recognized for his commitment to progressing the industry.

Jim West possesses over 25 years experience in the Information Technology field with over 15 years focused within Cyber Security. He has worked in the IT and Security industry across many sectors of commercial, space, federal, and defense with expertise in Biometrics, Risk Management, Security Analysis, and Network and Systems Auditing. Jim holds multiple certifications which include: CISSP-ISSEP, ISSMP, CAP, GSLC, GCIH, GSNA, GCWN, G2700, PMP, CIPP, C-CISO, CEH, and many others.

Jim was scheduled this year to speak and panel at events in Dubai, Kuwait, South Korea, Las Vegas, DC, Honolulu, Phoenix, and Tampa but unfortunately all events were cancelled this year due to COVID-19 related issues. His presentation topics included Quantum Computing, Cryptography, Defense in Depth, and Training Cyber Warriors. Besides being an excellent speaker, Jim is also an Award-Winning author and writer with over 50 publications. Recently Jims Cyber Security Test Tips & Methods ebook placed in the 100 Best Cyber Security Books of All-Time list by Bookauthority.org.

Awards Organiser Christina Price said, This is the inaugural year for these awards and we have been overwhelmed with the number, and quality of entrants. Those companies and individuals who have made the shortlist, should be pleased with their achievement as the competition to do so was tough. I know the judges are going to have a hard time selecting the overall winners.

TRECIG Chief Executive Officer, Roy Rucker, said, TRECIG could not be more pleased with the news of Jim being a finalist in the American Cyber Awards. He exemplifies the company values that sets TRECIG apart in this evolving and rapidly growing industry.

TRECIG is a Service-Disabled Veteran-Owned Small Business (SDVOSB) that provides a wide range of IT specialization, to include business development, human resource, program and project management, systems and software integration, enterprise-wide and cloud security, network engineering, penetration testing and product procurement, and more.

Contact Information:

TRECIG

Roy Rucker

832-266-4440

Contact via Email

trecig.com

Read the full story here: https://www.pr.com/press-release/819113

Press Release Distributed by PR.com

Visit link:
PR.com - TRECIG Executive, Jim West, Named Among the 2020 American Cyber Awards Finalists - IT News Online

States, sovereignty and the brave new world of cryptocurrencies – TRT World

How are governments adapting to disruptive digital currencies like bitcoin and blockchain payment systems?

Cryptocurrencies pose an unprecedented challenge to the existing monetary system. Powered by a decentralised blockchain platform, they transcend national sovereignty, central banks and commercial finance.

While cryptocurrencies were designed to be independent of any particular nation-state, that doesnt mean countries or multilateral institutions can afford to be indifferent to them.

Less than two weeks ago, the independent body,G30, published a report that put global policymakers and central bankers on notice, warning against technocratic passivity as digital currency systems rapidly develop and begin to shape the future of finance.

Having largely defied international coordination, the advent of cryptocurrencies and their increasing popularity has led to disjointed approaches by governments that often rely on arcane laws to regulate radically new technologies. Some states have started wielding it to promote their own political agendas, project influence, and bypass economic sanctions.

As aconsequence of Covid-19, the desire for digital payments and the growing appetite for cryptocurrencies like bitcoin has only accelerated, thrusting digital currencies onto the agenda of public officials forcing nation states to adjust to the brave new world of cryptocurrencies with their own central bank-backed digital tenders.

In an effort to tame anarchic cryptographic systems while appropriating its ability to reshape the financial order, could we see a super-sovereign digital currency that fundamentally reconstructs the global monetary system?

A spectacularly capricious rise

Cryptocurrency is a form of digital currency that relies on cryptography to facilitate direct peer-to-peer (P2P) online payments and eliminate the need for financial intermediaries. The first cryptocurrency, bitcoin, was conceived by a mysterious programmer Satoshi Nakamoto in a2008 whitepaper at the peak of the financial crisis.

While bitcoin has been the most popular, the cryptocurrency family members include ethereum, ripple, cardano, and litecoin, to name but a few.

The main technological innovation underpinning cryptocurrencies is the blockchain: a ledger containing all transactions for every single unit of currency. It differs from existing physical and digital ledgers in that there is no central authority verifying the validity of transactions.

What makes blockchain computing unique is the strongcommitments between users, developers and the platform. Trust arises from the mathematical and game-theoretic properties of the system without having to depend on the trustworthiness of individual network participants.

Authentication is built on cryptographic proof, where various members of the network verify blocks of transactions approximately every 10 minutes. The incentive is compensation in the form of newly minted cryptocurrency for the first member who provides the verification. This mining, while digitally rendered, requires specialised equipment as well as substantial electricity costs.

Scarcity is used to instill monetary value, much like gold. Ostensibly to prevent inflation, there will only ever be21 million bitcoin's in existence, and once miners have unlocked all of them (currently it stands at 18.5 million) supply will have tapped out unless protocols are changed.

As the limit is approached, the coin-creating algorithms get more difficult to solve, demanding additional computing power. Bitcoin's mining difficulty is now said to be at arecord high, coming two months after itsquadrennial halving.

Seven years since the firstinitial coin offering (ICO), the total market capitalization of crypto assets stands at$357 billion. Market valuations have been notoriously volatile in December 2017 Bitcoin hit an all-time-high of $20,000 only to lose84 percent of its value by the same time next year.

Some have dismissed bitcoin as a fad, evoking parallels with other great historical manias like theDutch tulip bulb frenzy of the 1630s, theSouth Sea bubble of the 1710s and the US stock market orgies of the 1920s and 1990s.

Indeed, one of the core contentions with cryptocurrencies is their speculative nature; the broad correction that occurred in 2018 points to the threat of collapse. Digital gold comparisons aside,questions linger over their reliability as a store of value and means of exchange in other words, the classic properties of money. Theirenvironmental impact cannot be dismissed either.

To mitigate the problem of volatility is a category of cryptocurrencies called stablecoins, which can be pegged to a currency or exchange-traded commodities. Many new issuers have entered the stablecoin market in recent years (Tether being the major one) with the total value of issued US dollar stablecoins reaching almost$3 billion by 2019.

After bitcoins meteoric rise into themainstream in 2015 and the subsequentcrypto boom in 2017, financial institutions and governments alike could no longer ignore the growth of digital currencies anddecentralised finance (DeFi) projects.

Cryptocurrencies like bitcoin are not localised to a particular country or region. Due to its decentralised nature, bitcoins circulation has largely circumvented regulatory oversight or monetary policy that traditionally is enforced upon private currencies and e-money.

For new technology enthusiasts and those who want to build a world outside the control of state machineries and regulatory authorities, cryptocurrencies are revolutionary for some, even the basis for a post-capitalist future in which nations have withered away.

For governments and central banks, its very design undermines notions of national sovereignty and how fiat money functions.

Meanwhile, unregulated exchanges are also expanding incredibly fast. Mature blockchain startups are gaining market share and a new crypto services industry is taking shape as part of the evolution towardsWeb 3.0, or the next iteration of the Internet premised on decentralised tenets.

New consumer products range fromDIY index fund creators,bitcoin derivatives,crypto wallet-cum-domain registrars,decentralised exchange aggregators,interest-earning savings accounts, todividend reinvestment plans.

If the industry is able to move beyond the current phase of speculation and volatility, and build more institutional structures, crypto assets have the potential to play a pivotal role in underpinning a new financial architecture.

But some technology expertswarn that for all the promise of new cryptographic systems, it could take between five to ten years to harden. For any country that decides to transition, a substantial amount of risk is inevitable.

An evolving regulatory landscape

As with any emerging market, regulators are having to play catch up, tasked with protecting the public and maintaining market stability while not stifling innovation.

Last June, G20 memberspublished a request for a global regulatory framework to be implemented to manage the benefits and challenges of the emerging crypto ecosystem.

Yet, something as fundamental as classification evades consensus: Are cryptocurrencies an entirelynew asset class? Are they monetary, commodities, taxable property?

Within the first few months of 2020 alone,French,German andAustralian authorities issued decisions with three different interpretations of bitcoin: as a currency, a financial instrument, and a security.

Regulators have particularly honed on the risks crypto assets pose concerningterrorism,money laundering, and other forms of financial crime. A US Drug Enforcement Administrationreport warned that virtual currencies like bitcoin enable transnational criminal organisations to easily transfer illicit proceeds internationally.

Globally, regulatory approaches have been divergent, albeit constantly evolving.

South Korea, which experienced arguably the greatestcrypto mania to date, has seen proactive government intervention. In March, the National Assembly passed one of the worldsfirst comprehensive cryptocurrency laws that will provide the framework for regulation and legalisation of cryptocurrencies and exchanges.

Japan recognises Bitcoin as a currency and was the first country to have enacted a law defining Virtual Currency as a legal term. Amendments to laws that regulate crypto in Japan werepassed this May, tightening measures aimed at helping the marketmature in the long run.

Singapore, commonly referred to as one of the worlds cryptohavens, has fostered a balanced legal and regulatory regime. In June, the carpooling app Ryde became theworlds first ride-sharing company to incorporate crypto as a native payment method.

By contrast, China has one of the most restrictive crypto environments in the world, having banned all ICOs and domestic crypto exchanges in 2017. It still permits crypto mining activities at its peak China was home to over 80 percent of the worlds bitcoin miners although it hascracked down on those operations too. Last month, the supreme courtcalled for stronger protections of digital currency rights.

In India, where a cashless economy is actively promoted, crypto still remains an outlier. The industry has beengrowing exponentially since March, when the supreme courtoverturned the Reserve Bank of Indias prohibition on banks providing services to crypto-related entities. Three months later however, the government wasreconsidering a blanket ban.

Russia meanwhile has been hostile to the industry. At the end of last month, Russian President Vladimir Putinsigned the first of two bills on digital assets into law that makes it illegal to issue and trade crypto on Russian-based infrastructure.

The UKs Financial Conduct Authority (FCA) took over as the Anti-Money Laundering and Counter-Terrorist Financing (AML/CTF) supervisor last October and since the jurisdiction officially came into effect on January 10, all UK crypto firms aremandated to register with the agency and operate under its supervision within a year or be forced to terminate all activity

In January, the5th EU Anti-Money Laundering Directive came into effect, requiring registration of crypto exchanges with financial regulators and the transfer of client wallet addresses to them. While bitcoin has legal status in the EU there exists no overarching framework, leaving member states to forge their own regulatory paths.

Malta has taken a very progressive approach and positioned itself as a global leader in crypto regulation. While not legal tender, cryptocurrency exchanges are, and in 2018 the government introducedlandmark legislation that defined a regulatory framework and addressed AML/CFT concerns.

Portugal has pushed the spread of crypto withtechnological free zones. As thefirst European country to develop rules governing ICOs, Gibraltar is positioning itself as acrypto hotspot this year, attracting firms with regulations that grant formal licenses.

Switzerland has long been a blockchain startup magnet; the city of Zug was nicknamed Crypto Valley during the 2017 bonanza. In July, the Swiss governmentpassed a legislative package intended to encourage crypto businesses by lowering legal barriers to applications of blockchain and distributed ledger technology.

In the US and Canada, a piecemeal approach prevails where federal and state regulators claim portions of the regulatory responsibility. At the federal level, both countries view cryptocurrencies as securities. However, provincial and state regulation differ in their taxation requirements of profits from crypto investments.

The US does not prohibit cryptocurrencies but it is still not integrated into the countrys financial structure. Glen Goodman, the author of The Crypto Trader, highlights afundamental tension: the US government has an interest in maintaining the dollars dominant position in global finance and encouraging cryptocurrencies would ultimately undermine that power.

The sovereign strikes back

While cryptocurrencies challenge the primacy of the state and its monopoly on creating, printing and control of legal tender, the recent development of state-sanctioned, sovereign-backed cryptocurrencies reveals that states (along with Big Tech platforms and financial institutions) have begun to maneuver and adapt to this disruptive landscape.

Central banks have since begun exploring the concept of central bank digital currencies (CBDC) through the creation ofresearch and working groups, as have international organisations like the International Monetary Fund (IMF), the Bank for International Settlements (BIS) in addition to aCBDC Group think tank.

ABIS survey published in January showed that advanced economies were actively analysing the potential impact of stablecoins, with central banks like the US Federal Reserve, European Central Bank (ECB), Bank of England (BoE) and Bank of Japan (BoJ) all actively exploring the space.

In contrast to bitcoin and other decentralised digital currencies, CBCDs are issued and tracked by central banks. They are intended to be digital versions of fiat currencies and represent many of the same features. CBDCs attempt to upgrade payment infrastructure, while bitcoin is an attempt to upgrade money.

The launch of Facebooks stablecoin Libra, announced in the summer of 2019, undoubtedly raised the stakes. Here was an entity with 2.7 billion users proposing to institute aprivate parallel currency that would bypass central banks, regulators and existing currency systems.

State authorities naturally feared their monetary autonomy was at risk of being undermined by a privately centralised digital currency.

Libra has been a motivating factor behind the pursuit by governments to begin issuing their own digital currencies and a key impetus behind Chinas launching its own sovereign digital currency project.

Against the backdrop of a trade war, Facebook founder Mark Zuckerberg cautioned Congress to support Libra lest the Chinese get a head start in the digital currency arms race. Anxiety that the yuan could be cut out from Libras basket of currencies was duly registered by Chinese bankers.

Beijing then moved into high gear. On October 24, 2019, a day now called China Blockchain Day, President Xi Jinping announced the rollout of the countrys state-sanctioned cryptocurrency called the Digital Currency and Electronic Payment (DCEP), linked to the yuan on a 1-to-1 basis.

The contrast was clear. While Libra sought to challenge government authority over legal tender, Chinas DCEP reinforces state control, discarding paper currency not central banks.

In late April, Chinatrialledthe digital yuan in four cities: Shenzhen, Suzhou, Chengdu and Xiongan. The trial was adopted into the cities monetary systems, with some government employees and public servants receiving salaries in the digital currency and select food and retail outlets also involved.

By running the most advanced simulation to date, China is well on its way to launching the worlds first official digital currency.

There aremultiple motivations behind Beijings drive to tokenise the yuan.

For one, Beijing understood bitcoins popularity in China and the potential of cryptocurrencies to usurp the states money-printing capabilities. While the response was a ban at first, it was savvy enough to convert cryptocurrencys most beneficial aspects to serve state goals: reducing transaction costs for business and friction in P2P payment; easier cross-border payments; and potentially bringing millions of unbanked Chinese citizens into the system. Not to mention, a more hygienic payment option in a pandemic-ridden world.

Secondly, by developing a sovereign digital currency administered by the People Bank of China (PBOC), a supervisory architecture would be in place tostem capital flight, which China considers high risk despite extensive capital controls currently in place.

There is also a more ambitious long-term goal: internationalisation of the yuan. If widely implemented, the expectation is that a digital yuan would compete with the US dollar-denominated financial order and make attacks on and speculation of the yuan harder something PBOC governor Yi Gang has madeexplicit.

Another ambition of the DCEP is to regionalise the currency and tie it to Chinas expansive Belt and Road Initiative (BRI). To accelerate adoption, what if Beijing makes it a condition for recipient countries taking loans to accept the digital yuan?

With pressure mounting to catch up with China, the BoJ has prioritised adigital yen and confirmed that it will be considered as part of this years legislative agenda. The Philippine central bank has alsocommissioned CBDC research.

Project Ubin, designed by the Monetary Authority of Singapore (MAS) in partnership with state-owned investor Temasek and US investment bank JP Morgan, just completed itsfifth phase and has branched out to capital markets, supply chain finance and insurance. With the Singaporean blockchain payments initiative moving closer to commercialisation, it could eventually form the basis of a global payments platform for central banks.

There are shadier sides to CBDCs too. Venezuela created its own cryptocurrency the Petro designed to skirt US sanctions on the countrys oil trade business and secure liquidity for the Maduro regime in the face of exorbitant inflation and a collapsing economy.

The Petro was met with major resistance from the US, and Donald Trumps executive order ban might set aprecedent for how future (foreign) state-backed cryptocurrencies will be regulated by Washington.

In each of these cases, a clear theme has emerged: the state is alive and well, and not going away anytime soon.

Amid the fallout of a global pandemic, the managerial role of the state has only increased. With geopolitics slowly shaping the landscape of the cryptosphere, investors that have so far been insulated from government oversight are unlikely to be for much longer.

Centralised digital currencies now present governments with the capacity to upgrade payment infrastructures while retaining fiduciary hegemony, a win-win.

As James Cooper, a law professor and blockchain adviser,poignantly observes: nothing is more centralising than a states control over decentralized technologies like blockchain and cryptocurrency.

For the moment, the libertarian dream of cryptocurrencies being pregnant with the ability to transcend the state apparatus appears premature. Governance mechanisms will continue to exist as long as someone controls the supply of digital money.

The more relevant question to ask now is: have we entered into an era of sovereign digital currencies?

Source: TRT World

See the original post:
States, sovereignty and the brave new world of cryptocurrencies - TRT World

The League of Entropy Launches Production Drand Network, Providing the First Publicly Verifiable Distributed Randomness Beacon – PRNewswire

WASHINGTON, Aug. 10, 2020 /PRNewswire/ --Today a consortium of technology companies and universities launched an upgraded public randomness network. Drand is a distributed randomness beacon that generates verifiable, unpredictable, and unbiasable random numbers as a service available for all. Drand's largest deployment is known as the League of Entropy, and its founding members include Cloudflare, cole polytechnique fdrale de Lausanne (EPFL), Kudelski Security, Protocol Labs, and the University of Chile. With the upgraded drand network, the consortium also announced its expanded member list, now also including C4DT, ChainSafe, cLabs, Emerald Onion, Ethereum Foundation, IC3, PTisp, Tierion,and UCL, and a new model of collaborative governanceto better protect drand for its users.

The upgrade to drand, which was initially developed by Nicolas Gailly at the DEDIS laboratory and first launched as an experimental research network in 2019, includes many new features and architecture improvements to make it a production-level service. The updates include a three-layered network architecture, deployment and network monitoring tools, a full specification and security model and more.

Filecoin, Protocol Labs' decentralized storage network, is the first production user of drand. Drand's randomness values record the consensus of all clients on the correct history of the Filecoin blockchain and powers the leader elections that decide which miner will publish a new block to the blockchain, which ensures the Filecoin blockchain continues to grow.

The League of Entropy believes that drand can become a fundamental internet service.

David Dias, P2P Software Engineer and Researcher at Protocol Labs, said, "We're thrilled to make the upgraded drand network available for the world to access. Drand has the potential to transform the internet as we know it by offering an unbiasable and publicly verifiable randomness beacon. We look forward to seeing how drand gets used by mission critical and high value operations, such as new blockchain systems, like Filecoin."

Nick Sullivan, Head of Research at Cloudflare, said, "The League of Entropy is creating the basis for future systems to leverage trustworthy public randomness online, and the new collaborative governance will only improve its ability to do so. We're excited to watch drand help prevent bias and detect manipulation in elections, lotteries, and distributed ledger platforms, and improve the Internet for generations to come."

Ryan Spanier, VP of Innovation at Kudelski Security, said,"We are excited to launch the next iteration of the drand network, and are proud to provide three secure, trusted sources of randomness fully monitored by our Cyber Fusion Center. Issues in randomness generation remain among the most common vulnerabilities uncovered by our cryptography audit teams and we hope that drand will contribute to build a safer digital space."

Randomness is crucial for nearly every sector of modern society from voting systems and traffic management to financial services and secure communications. In order for public randomness to be practical, it needs to be unpredictable, verifiable, bias-resistant, decentralized, and always available, which drand achieves.

To learn more about drand, visit their new website at https://drand.love/.

About the League of Entropy

The League of Entropy is a consortium of organizations that are working together to produce a truly random beacon. Members currently include C4DT, ChainSafe, cLabs, Cloudflare, Emerald Onion, EPFL, Ethereum Foundation, IC3, Kudelski Security, Protocol Labs, PTisp, Tierion, UCLand the University of Chile. Every other existing randomness beacon is generated by an individual entity, which means that an adversary would need to take control of only one party to tamper with randomness. This is the first time ever that a randomness beacon is run by several organizations in concert. The League of Entropy has created a global unbiased beacon that can be cryptographically verified, an industry first.

SOURCE The League of Entropy

View original post here:
The League of Entropy Launches Production Drand Network, Providing the First Publicly Verifiable Distributed Randomness Beacon - PRNewswire

Quantum Key Distribution: The Next Generation – A Ten-year Forecast and Revenue Assessment 2020-2029 – ResearchAndMarkets.com – Benzinga

The "Quantum Key Distribution: The Next Generation - A Ten-year Forecast and Revenue Assessment: 2020 to 2029" report has been added to ResearchAndMarkets.com's offering.

This report provides forecasts and analysis for key QKD industry developments. The author was the first industry analysis firm to predict that quantum security in mobile phones would become a significant revenue earner in the short-term. Phones using QRNGs were announced earlier this year and this report discusses how the mobile QRNG market will evolve.

There have been some big developments in the QKD space. In particular, the regulatory and financial framework for the development of a vibrant QKD business has matured. On the standardization and funding front, the ITU-T standardization is near complete while both the US and UK governments have announced major funding for large-scale quantum networks with QKD as a central component. And the QuantumCtek IPO may just be the beginning of the new public companies in this space.

The report contains forecasts of the hardware and service revenues from QKD in all the major end-user groups. It also profiles all the leading suppliers of QKD boxes and services. These profiles are designed to provide the reader of this report with an understanding of how the major players are creating QKD products and building marketing strategies for QKD as quantum computers become more ubiquitous.

Key Topics Covered:

Executive Summary

E.1 Key Developments Since our Last Report

E.2 Specific Signs that the Market for QKD is Growing

E.3 Evolution of QKD Technology and its Impact on the Market

E.3.1 Reach (Transmission Distance)

E.3.2 Speed (Key Exchange Rate)

E.3.3 Cost (Equipment)

E.4 Summary of Ten-year Forecasts of QKD Markets

E.4.1 Forecasts by End-user Segment

E.5 Five Firms to Watch Closely in the QKD Space

Chapter One: Introduction

1.1 Why QKD is a Growing Market Opportunity

1.2 Overview of QKD Technological Challenges

1.3 Goals and Scope of this Report

1.4 Methodology of this Report

1.5 Plan of this Report

Chapter Two: Technological Assessment

2.1 Setting the Scene: QKD in Cryptography-land

2.2 Why QKD: What Exactly does QKD Bring to the Cryptography Table?

2.3 PQC's Love-Hate Relationship with QKD

2.4 QKD's Technological Challenges

2.5 QKD Transmission Infrastructure

2.6 Chip-based QKD

2.7 QKD Standardization: Together we are Stronger

2.8 Key Takeaways from this Chapter

Chapter Three: QKD Markets - Established and Emerging

3.1 QKD Markets: A Quantum Opportunity Being Driven by Quantum Threats

3.2 Government and Military Markets - Where it all Began

3.3 Civilian Markets for QKD

3.4 Key Points from this Chapter

Chapter Four: Ten-year Forecasts of QKD Markets

4.1 Forecasting Methodology

4.2 Changes in Forecast Since Our Last Report

4.2.1 The Impact of COVID-19

4.2.2 Reduction in Satellite Penetration

4.2.3 Faster Reduction in Pricing

4.2.4 Bigger Role for China?

4.2 Forecast by End-User Type

4.3 Forecast by Type of QKD Infrastructure: Terrestrial or Satellite

4.4 Forecast of Key QKD-related Equipment and Components

4.5 Forecast by Geography/Location of End Users

Chapter Five: Profiles of QKD Companies

5.1 Approach to Profiling

5.2 ABB (Switzerland/Sweden)

5.3 Cambridge Quantum Computing (United Kingdom)

5.4 ID Quantique (Switzerland)

5.5 KETS Quantum Security (United Kingdom)

5.6 MagiQ Technologies (United States)

5.7 Nokia (Finland)

5.8 QuantumCtek (China)

5.9 Quantum Xchange (United States)

5.10 Qubitekk (United States)

5.11 QuintessenceLabs (Australia)

5.12 SK Telecom (Korea)

5.13 Toshiba (Japan)

For more information about this report visit https://www.researchandmarkets.com/r/jp7dzd

About ResearchAndMarkets.com

ResearchAndMarkets.com is the world's leading source for international market research reports and market data. We provide you with the latest data on international and regional markets, key industries, the top companies, new products and the latest trends.

View source version on businesswire.com: https://www.businesswire.com/news/home/20200810005279/en/

Read more from the original source:
Quantum Key Distribution: The Next Generation - A Ten-year Forecast and Revenue Assessment 2020-2029 - ResearchAndMarkets.com - Benzinga