WEI Art Collections Unveils New Multi-Million Dollar Contemporary Art Collection Commemorating Bitcoin and Ethereum – Benzinga

DUBAI, United Arab Emirates, Aug. 06, 2020 (GLOBE NEWSWIRE) -- WEI Art Collections(https://weiartcollections.art) has stayed true to the meaning of their name with a new art collection. WEI means extraordinary and WEI Art Collections is again set to excite the creative industry with their latest multi-million-dollar contemporary private art collection to celebrate blockchain technology. The new series is an unprecedented fusion of crypto-currency and art.

WEI Art Collectionshas carved a niche for creating the finest, most extraordinary abstract, contemporary, and crypto art. With a team of talented and well-respected artists from different parts of the world, representing numerous cultural, ethnic, and racially diverse creative talent, the platform has provided art collectors as well as corporate and technology leaders with an opportunity to acquire exclusive works of art from the WEI Art Collections series.

The WEI Art Collections Innovation Series are specifically put together for crypto-currency whales, art buyers, and advocates of the blockchain technology. The series also has its obvious appeal to professionals in the financial sector. The latest collection is coming at the most ideal time, with the world rapidly embracing the features and benefits of crypto-currency and blockchain technology.

In the fall of 2018, Adam Lindemann stated in an article in Bloomberg news byKatya Kazakina(https://bloom.bg/3eYwpla ) on November 29 as follows: "Everyone is talking about blockchain, but no one really understands it." Adam is a billionaire and abstract contemporary art collector, amongst the world's leading art collectors. He noted, "This is the right time to think about art and tech."

As the mp3 file undeniably influenced and redefined how the world listens to music, blockchain technology is about to be applied in numerous industries. The use of crypto-currency has become increasingly popular in recent times, with experts predicting growth to the tune of tens of trillions of dollars in the near future. The International Monetary Fund has also substantiated the claim, commenting on the advantages, stability crypto-currency values will enjoy as world economies, and fiat currencies continue to falter. However, the creative industry has been seemingly silent on the subject of crypto-currency and this is where WEI Art Collections is looking to change the narrative with the WEI Art Collections Innovation Series.

WEI Art Collections initially features the top three of the most prominent crypto-currencies destined for global dominance in the blockchain, global banking, and financial industries. There is also the Innovation Series 21 featuring 21 unique works, developed exclusively featuring Bitcoin. The series is developed in commemoration of Bitcoins issuance of 21 million coins. WEI Art Collections exemplifies the pinnacle of the crypto-art medium, engaging and employing emerging artists directly.

The mission of WEI Art Collections is to be amongst the premier contemporary abstract and cryptography art designers/producers/collectors, featuring works that celebrate the bourgeoning field of Cryptography through the new world technology of blockchain digital assets. Owning an exclusive work from the WEI Art Collections Series will also serve as an investment that will go down in history and appreciate over time. For more information please visithttps:/weiartcollections.art/

Media contactCompany: WEI Art CollectionsContact: Jean MarquetteE-mail:info@weiartcollections.artWebsite:https://weiartcollections.art

See the original post:
WEI Art Collections Unveils New Multi-Million Dollar Contemporary Art Collection Commemorating Bitcoin and Ethereum - Benzinga

Institute for Pure and Applied Mathematics awarded $25M renewal from NSF – UCLA Newsroom

UCLAs Institute for Pure and Applied Mathematics, through which mathematicians work collaboratively with a broad range of scholars of science and technology to transform the world through math, has received a five-year, $25 million funding renewal from the National Science Foundation, effective Sept. 1.

The new award represents the latest investment by the NSF, which has helped to support IPAMs innovative multidisciplinary programs, workshops and other research activitiessince the institutes founding in 2000.

The continued NSF funding will enable IPAM to further its mission of creating inclusive new scientific communities and to bring the full range of mathematical techniques to bear on the great scientific challenges of our time, said Dimitri Shlyakhtenko, IPAMs director and a UCLA professor of mathematics. We will be able to continue to sponsor programs that bring together researchers from different scientific disciplines or from different areas of mathematics with the goal of sparking interdisciplinary collaboration that continues long after the IPAM program ends.

Mathematics has become increasingly central to science and technology, with applications in areas as diverse as search engines, cryptography, medical imaging, data science and artificial intelligence, to name a few, Shlyakhtenko said. Future developments, from sustainable energy production to autonomous vehicles andquantum computers, will require further mathematical innovation as well as the application of existing mathematics.

IPAMs goal is to foster interactions between mathematicians and doctors, engineers, physical scientists, social scientists and humanists that enable such technological and social progress. In the near future, for example, IPAM will be partnering with the new NSF Quantum Leap Challenge Institute for Present and Future Quantum Computation, which was launched in July with a five-year, $25 million award to UC Berkeley, UCLA and other universities.

Over its two decades of existence, IPAM has helped to stimulate mathematical developments that advance national health, prosperity and welfare through a variety of programs and partnerships that address scientific and societal challenges. Its workshops, conferences and longer-term programs, which last up to three months, bring in thousands of visitors annually from academia, government and industry.

IPAM also helps to train new generations of interdisciplinary mathematicians and scientists and places a particular emphasis on the inclusion of women and underrepresented minorities in the mathematics community.

In addition to the IPAM funding, the NSF recently announced five-year awards to five other mathematical sciences research institutes.

The influence of mathematical sciences on our daily lives is all around us and far-reaching, said Juan Meza, director of the NSF Division of Mathematical Sciences. The investment in these institutes enables interdisciplinary connections across fields of science, with impacts across sectors of computing, engineering and health.

Read the original:
Institute for Pure and Applied Mathematics awarded $25M renewal from NSF - UCLA Newsroom

National Teaching Fellowship recognises outstanding impact on student outcomes and teaching – Mirage News

Dr Basel Halak consistently shares his expertise and experiences for the benefit of his students.

Dr Basel Halak, a renowned leader in Electronics and Electrical Engineering education at the University of Southampton, has been awarded a prestigious UK National Teaching Fellowship.

The National Teaching Fellowship (NTF) Scheme, organised and managed by Advance HE, celebrates and recognises individuals who have made an outstanding impact on student outcomes and the teaching profession in higher education. This year marks the 20th anniversary of the NTF Scheme.

Dr Halak has made an outstanding contribution through the development and delivery of courses on secure embedded systems, which inspired many students to pursue a career in this field. He consistently shares his expertise and experiences in the pursuit of enhancing electronic engineering education across the globe to students from all backgrounds and privileges.

I am honoured to receive this prestigious fellowship, and very grateful to my students and colleagues, from around the globe, who have given me their support in pursuit of this Fellowship, said Dr Halak.

The emphasis in achieving this award was based on my work on building an inclusive learning environment that allows students from all background to achieve their maximum potential, as well as on devising new learning resources and pedagogic approaches to keep up with fast-paced development in the field of electronics engineering, Dr Halak explained.

The greatest benefit of this award is that it will connect me to a national network of excellent educators and previous winners, which will greatly support my work and create opportunities for career development, he concluded.

Professor Mark E Smith, President and Vice-Chancellor of the University of Southampton said: I would like to warmly congratulate Dr Halak on winning this National Teaching Fellowship, which follows his success in 2016 of winning a Vice-Chancellors Teaching Award. He can be very proud of this national recognition.

A truly great university needs to be fully committed to teaching alongside producing world class research, Professor Smith continued. External validation of the high quality of our teachers is provided through the award of this National Fellowship, giving strong evidence of Southampton delivering on being a dual excellence university.

Dr Halak is the director of the embedded systems and IoT (Internet of Things) programme at the University of Southampton, a visiting scholar at the Technical University of Kaiserslautern in Germay, a visiting professor at the Kazakh-British Technical University, an Industrial Fellow of the Royal Academy of Engineering and a Senior Fellow of the Higher Education Academy.

He has written over 80-refereed conference and journal papers, and authored three books, including the first textbook on Physically Unclonable Functions. His research expertise includes the evaluation of security of hardware devices, the development of appropriate countermeasures, the development of mathematical formalism of reliability issues in CMOS circuits (e.g. crosstalk, radiation, ageing), and the use of fault tolerance techniques to improve the robustness of electronics systems against such issues.

Dr Halak lectures on Digital Design, Hardware Security and Cryptography, supervises a number of MSc and PhD students, and is Southamptons Electronics and Computer Science Exchange Coordinator. He also leads the European Masters in Embedded Computing Systems (EMECS), a two-year course run in collaboration with Kaiserslautern University and the Norwegian University of Science and Technology in Trondheim.

Dr Halak serves on several technical program committees such as HOST, IEEE DATE, IVSW, ICCCA, ICCCS, MTV and EWME. He is an associate editor of IEEE Access and a guest editor of the IET circuit devices and system journal. He is also a member of the hardware security-working group of the World Wide Web Consortium (W3C).

Dr Halak joins an excellent group of colleagues at Southampton who have also received National Teaching Fellowships, including Sally Curtis and Scott Border (Medicine), Simon Kemp (Geography and Environmental Science), Judith Holloway (Medicine), James Wilson (Health Sciences), David Read (Chemistry) and Mike Wald (Electronics and Computer Science).

Continue reading here:
National Teaching Fellowship recognises outstanding impact on student outcomes and teaching - Mirage News

WEI Art Collections Unveils New Multi-Million Dollar Contemporary Art Collection Commemorating Bitcoin and Ethereum – Yahoo Finance

WEI Art Collections Unveils Art Collection Commemorating Bitcoin and Ethereum

WEI Art Collections Unveils Art Collection Commemorating Bitcoin and Ethereum

DUBAI, United Arab Emirates, Aug. 06, 2020 (GLOBE NEWSWIRE) -- WEI Art Collections(https://weiartcollections.art) has stayed true to the meaning of their name with a new art collection. WEI means extraordinary and WEI Art Collections is again set to excite the creative industry with their latest multi-million-dollar contemporary private art collection to celebrate blockchain technology. The new series is an unprecedented fusion of crypto-currency and art.

WEI Art Collectionshas carved a niche for creating the finest, most extraordinary abstract, contemporary, and crypto art. With a team of talented and well-respected artists from different parts of the world, representing numerous cultural, ethnic, and racially diverse creative talent, the platform has provided art collectors as well as corporate and technology leaders with an opportunity to acquire exclusive works of art from the WEI Art Collections series.

The WEI Art Collections Innovation Series are specifically put together for crypto-currency whales, art buyers, and advocates of the blockchain technology. The series also has its obvious appeal to professionals in the financial sector. The latest collection is coming at the most ideal time, with the world rapidly embracing the features and benefits of crypto-currency and blockchain technology.

In the fall of 2018, Adam Lindemann stated in an article in Bloomberg news byKatya Kazakina(https://bloom.bg/3eYwpla ) on November 29 as follows: "Everyone is talking about blockchain, but no one really understands it." Adam is a billionaire and abstract contemporary art collector, amongst the world's leading art collectors. He noted, "This is the right time to think about art and tech."

As the mp3 file undeniably influenced and redefined how the world listens to music, blockchain technology is about to be applied in numerous industries. The use of crypto-currency has become increasingly popular in recent times, with experts predicting growth to the tune of tens of trillions of dollars in the near future. The International Monetary Fund has also substantiated the claim, commenting on the advantages, stability crypto-currency values will enjoy as world economies, and fiat currencies continue to falter. However, the creative industry has been seemingly silent on the subject of crypto-currency and this is where WEI Art Collections is looking to change the narrative with the WEI Art Collections Innovation Series.

WEI Art Collections initially features the top three of the most prominent crypto-currencies destined for global dominance in the blockchain, global banking, and financial industries. There is also the Innovation Series 21 featuring 21 unique works, developed exclusively featuring Bitcoin. The series is developed in commemoration of Bitcoins issuance of 21 million coins. WEI Art Collections exemplifies the pinnacle of the crypto-art medium, engaging and employing emerging artists directly.

The mission of WEI Art Collections is to be amongst the premier contemporary abstract and cryptography art designers/producers/collectors, featuring works that celebrate the bourgeoning field of Cryptography through the new world technology of blockchain digital assets. Owning an exclusive work from the WEI Art Collections Series will also serve as an investment that will go down in history and appreciate over time. For more information please visithttps:/weiartcollections.art/

Media contactCompany: WEI Art CollectionsContact: Jean MarquetteE-mail:info@weiartcollections.artWebsite:https://weiartcollections.art

See the article here:
WEI Art Collections Unveils New Multi-Million Dollar Contemporary Art Collection Commemorating Bitcoin and Ethereum - Yahoo Finance

Are Police Spying on Your Phone? Ask the Crocodile Hunter – PCMag India

(Image: Getty)

Think your calls and texts are secure? Think again.

Nefarious devices have long masqueraded as cell towers in a bid to intercept data from mobile devices. But at this week's (virtual) Black Hat, Cooper Quintin, Senior Staff Technologist at the Electronic Frontier Foundation, outlined a way to detect these bogus base stations, and offered suggestions on how to prevent their use altogether.

Phony cell towers have been a mainstay of Black Hat and security research for years. Traditionally, the attack worked like this: the bad guy sets up a mobile cell station, like a Femtocell, and then jams the 3G and LTE bands. This forces nearby phones to connect via 2G, which uses a broken encryption system. Once phones connect, the attacker can see anything moving to and from victims' phones.

Police and other law enforcement agencies do the same with IMSI-catchers, which also simulate cell towers and trick devices into connecting. The use of these devices has long been controversial and shrouded in secrecy, but little was known about newer devices that targeted the 4G LTE bands. "We simply had no idea how they worked," Quintin said today.

This is important not only because 2G is increasingly obsolete, but because 4G offers numerous security improvements. LTE devices, for example, use better cryptography, and don't blindly connect to nearby cell towers. Understanding how LTE IMSI catchers worked would shed light on unknown vulnerabilities that might exist in the system.

In 2019, EFF Technology Fellow Yomna N tackled the problem, eventually producing a report that outlined the theoretical operation of a 4G IMSI catcher. In his presentation, Quintin showed how the first six steps of connecting a cellular device to a base station happened totally in the clear, and authentication didn't happen until the seventh step.

"This is where the dragons were," he said. During these initial steps, all sorts of important information could be extracted from the target device by a cell site simulator. It could even trick victims' phones into using a 2G connection, again opening up transmissions to the attacker.

Importantly, Quintin said that unless it's able to pull of its 2G switch, the new cell site simulators probably aren't able to intercept your data. But newer 4G IMSI catchers can track devices and surveil large crowds, like those found at protests.

Security wonks have already released several tools for finding bogus cell towers. Some rely on software-defined radio technology, while others are simply smartphone apps. But while they're useful, none are adequate for ferreting out newer cell site simulators, Quintin said.

So the EFF produced its own tool: Crocodile Hunter. Why the name? "Stingray" is the brand name for an IMSI catcher marketed to law enforcement. It's also the animal that killed Steve Irwin, star of the TV program Crocodile Hunter.

Crocodile Hunter uses a Raspberry Pi and about $500 worth of radio equipment. The setup gatherers data about all the surrounding cell sites, and then compares that information against an open-source database of known cell towers. Anything that's a mismatch gets marked on a map with a skull.

Quintin stressed, however, that just because something's anomalous doesn't mean it's nefarious. Suspicious sites were found and examined. If it turned out to be attached to a tower or a building, that was probably legit. "If it's not a building at all but an unmarked van, well, that's more suspicious," said Quintin.

One thing Crocodile Hunter can't do is communicate with the questionable cell towers, and for good reason"EFF lawyers helpfully pointed out, that would be illegal," explained Quintin.

The problem is that Crocodile Hunter isn't licensed by the FCC for such operations. That's too bad, because it would give researchers a lot more information about the suspect cell sites.

Work on Crocodile Hunter is ongoing, and Quintin hopes to improve its detection capabilities and bring down the cost of construction. The EFF has released all the information about Crocodile Hunter on GitHub, where any enterprising researcher can build their own version. The technology is currently being used in DC and New York, as well as in Latin America through the Fake Antenna Detection (FADe) project, Quintin said.

While detecting bogus cell towers is all well and good, Quintin has an eye on making it much harder for anyone to use IMSI catchers, or similar technologies, to surveil people. He called on Apple and Google to provide a toggle so users who don't need to use 2G can simply switch it off in Android and iOS. "This would eliminate the worst abuses such as downgrading to 2G," he said.

Quintin also suggested that the pre-authentication messages for 4G (and, he noted, 5G) either be eliminated or encrypted. Manufacturers and standards groups, Quintin suggested, should also make customer privacy a greater priority.

"None of these are foolproof, and none of these will stop [cell site simulators] entirely, but we aren't even doing the bare minimum," said Quintin.

Still, the talk ended on an upbeat note: "With a little elbow grease, and a little bit of political effort, this problem of IMSI catchers could be solved."

Further Reading

Security Reviews

Security Best Picks

See more here:
Are Police Spying on Your Phone? Ask the Crocodile Hunter - PCMag India

National Cybersecurity Authority (NCA): What You Need to Know – tripwire.com

In its Vision 2030 development plan, Saudi Arabia included a National Transformation Program whose purpose is to diversify the Kingdoms income away from the oil industry. One of the core tenets of that program is to enable the growth of the private sector by developing the digital economy. Specifically, Saudi Arabia set out its intention to increase the contribution of the digital economy thats non-oil GDP from 2% to 3% by 2030. The Kingdom made clear that this process must involve partnering with private actors to develop more telecommunications/IT infrastructure along with supporting local investment in those sectors.

The Kingdom also recognized that it must take appropriate security measures to secure this process. As stated in a document published on its website:

This transformation requires easing the flow of information, securing it and preserving the integrity of all systems. It also requires maintaining and supporting the cybersecurity of the Kingdom in order to protect its vital interests, national security, critical infrastructures, high priority sectors and governmental services and practices.

Acknowledging these tasks, Saudi Arabia created the National Cybersecurity Authority (NCA) as well as approved the government entitys mandate to develop national digital security policies by royal decree. The NCA acted upon this directive by developing the Essential Cybersecurity Controls (ECC), measures which constitute the minimum security requirements for in-scope national organizations. As such, compliance with ECC is mandatory for those entities.

So, how can organizations ensure compliance with ECC?To answer that question, this blog post will first examine the five domains of ECC. It will then explain how Tripwire Enterprise can assist organizations in achieving compliance with the Controls domains using foundational controls for security, compliance and IT operations.

The NCA created the Essential Cybersecurity Controls in 2018 to help government organizations as well as private sector actors who own, operate or host national critical infrastructure to minimize the risks from external and internal digital security threats. Taking into account in-scope entities strategies, people, processes and technology, these security measures consist of 114 individual controls that are designed to uphold the confidentiality, integrity and availability of information and technology assets.

The ECC consist of five domains comprised of 29 subdomains. These are as follows:

1. Cybersecurity Governance

a. Cybersecurity strategy: All digital security plans and policies must advance the organizations efforts to comply with pertinent laws and regulations.

b. Cybersecurity management: An Authorizing Official within each organization must create a digital security department, steering committee and function head.

c. Cybersecurity policies and procedures: Each organization must have documented digital security policies/plans as well as comply with those strategies.

d. Cybersecurity roles and responsibilities: An organization must define all roles and positions related to digital security within its workforce.

e. Cybersecurity risk management: An in-scope entity must take a methodological approach to minimize risks pertaining to its IT and technological assets.

f. Cybersecurity in information and technology project management: Project management methodology procedures must take digital security into account.

g. Compliance with cybersecurity standards, laws and regulations: An entitys digital security program must comply with existing laws and regulations.

h. Periodical cybersecurity review and audit: Organizations must submit to an audit process to determine if their plans and procedures are in compliance with ECC.

i. Cybersecurity in human resources: An entity must address employee digital security from the time when someones hired to when they leave the company.

j. Cybersecurity awareness and training program: All employees need to receive whatever resources are necessary to fulfill their digital security responsibilities.

2. Cybersecurity Defense

a. Asset management: An organization needs to know what hardware and software are connected to the network if they are to protect their IT and technology assets.

b. Identity and access management: Without proper access controls, unauthorized users could compromise an organizations information and technology assets.

c. Information system and information processing facilities protection: An organization needs to safeguard its information system and processing facilities.

d. Email protection: In-scope entities need to take the proper precautions to defend their email systems against digital threats.

e. Networks security management: An organization should use network segmentation/segregation, IPSes and other tools to secure their networks.

f. Mobile devices security: Entities need to protect all mobile devices against digital threats and secure all information under their BYOD policy.

g. Data and information protection: An organization needs to take the proper measures to safeguard their data and information assets.

h. Cryptography: In the name of data protection, an organization needs to efficiently use cryptography to protect its information per its policies and procedures.

i. Backup and recovery management: Entities in the scope of ECC need to secure their information systems and software configurations against digital risks.

j. Vulnerabilities management: If they fail to detect and remediate security bugs on a timely basis, an organization could allow attackers to exploit vulnerabilities.

k. Penetration testing: An organization should use simulated digital attacks to evaluate its digital defenses against malicious actors.

l. Cybersecurity event logs and monitoring management: Logs can help an organization detect a security issue before it balloons into a security incident.

m. Cybersecurity incident and threat management: In the event of an incident, an organization needs to respond appropriately so as to minimize the damages.

n. Physical security: An organization must safeguard their IT and technology assets against physical loss, damage and/or unauthorized access.

o. Web application security: Digital threats pose a risk to external web applications; an organization needs to defend itself accordingly.

3. Cybersecurity Resilience

a. Cybersecurity Resilience Aspects of Business Continuity Management (BCM): An organization needs to protect its IT assets against potential disasters and include resiliency requirements within its business continuity plan.

4. Third-Party and Cloud-Computing Cybersecurity

a. Third-party cybersecurity: Third parties including managed services and outsourced agents pose a threat to information assets; an organization needs to follow its policies and procedures to defend itself accordingly.

b. Cloud computing and hosting cybersecurity: To remediate digital threats pertaining to its hosting and cloud computing systems, an organization needs to protect its assets hosted on the cloud and managed by third parties.

5. Industrial Control Systems Cybersecurity

a. Industrial Control Systems (ICS) Protection: An organization needs to safeguard its industrial control systems and OT assets against digital threats.

The NCA ultimately leverages self-assessments, reports from its assessment and compliance tool and/or on-site audits to ensure that in-scope entities remain compliant with the Essential Cybersecurity Controls. In pursuit of this objective, organizations should follow the NCAs guidance and implement whatever necessary to ensure continuous compliance with the controls. (This recommendation reflects the reality that not every organization can implement every control identified above. As an example, the fourth and fifth domains would not pertain to organizations that do not use the cloud and that dont manage ICS systems.)

Tripwire Enterprise can help organizations achieve their ECC compliance with the NCA. This solution is particularly effective with regards to some of the controls identified in the second domain of Cybersecurity Defense. It does this by converting the technical controls for the purpose of configuration hardening, thereby ensuring a systems security configurations are appropriate given the job that it needs to do.

Here are five controls as an example:

Organizations can easily monitor their performance across all of these and other security controls using the dashboard provided by Tripwire Enterprise.

Tripwire Enterprise specifically provides customers with several important secure configuration management (SCM) capabilities. These include the following:

Taken together, organizations can leverage these SCM capabilities to ensure the confidentiality, integrity and availability of their IT and technology assets for the purpose of helping to grow Saudi Arabias digital economy.

For more information on how Tripwire can help your organization maintain ECC compliance, click here.

Excerpt from:
National Cybersecurity Authority (NCA): What You Need to Know - tripwire.com

Quantum Computing and the evolving cybersecurity threat – Security Boulevard

Where would we be without computers? Whether giving us the chance to work remotely, work on files with colleagues in real time, or for recreational activities like streaming there can be no doubt that computing devices have changed the way we go about our day-to-day lives.

However, while more traditional computers are great for completing run-of-the-mill tasks, there are many more complex problems in the world that these machines will struggle to solve. For problems above a certain size and complexity, traditional machines simply dont have enough computational power to tackle them. To put this in perspective, Fugaku, the worlds fastest supercomputer is over 1,000 times faster than a regular computer, and, in 2019 Google claimed its Sycamore quantum processor was more than a billion times faster at solving problems than a supercomputer.

Given their processing superiority, if we want to have a chance at solving some of the worlds most complex issues, we must look to quantum computers.

Understanding Quantum Computing

In case you are unfamiliar with the concept, quantum computing leverages the substantial mechanics principles of superposition and entanglement in order to create states that scale exponentially with the number of quantum bits or qubits. Rather than just being on or off, qubits can also be in whats called superposition where theyre both on and off at the same time, or somewhere on a spectrum between the two.

Put more simply, for scientists to properly simulate scientific situations, the calculations they make on a computer must be able to handle uncertainty in the way that traditional, and even supercomputers cant. This is the key characteristic of quantum computing.

Today, real quantum processors are used by researchers from all over the world to test out algorithms for applications in a variety of fields. Indeed, these computers may soon be able to spur the development of new breakthroughs in science, medication for currently incurable diseases, discovering materials to make more efficient devices and structures like more powerful solar panels as well as creating algorithms to quickly direct resources to where they are needed, such as ambulances.

Quantum Computing and Cybersecurity

However, not only do these machines have to be protected from hackers, they themselves could also pose a threat to digital life as we know it.

Right now, for example, cyberattacks can be carried out with relative ease, due to the fact many organisations do not have protections in place for their confidential information. As such, placing a much greater emphasis on improving the security of communications and data storage is crucial for guaranteeing the protection of sensitive information for states, private entities and individuals, than say 20 years ago. However, if quantum computers can launch attacks that break asymmetric cryptography, they then render the entire PKI-based encryption method we currently use to protect our sensitive information, obsolete. Which begs the question: Then what?

To take advantage of the time quantum computers will be able to break such systems, some countries are already beginning to collect encrypted foreign communications, with the expectation that they will be able to extract valuable secrets from that data in the future. Indeed, countries need to be aware that when quantum cryptanalysis does become available, it will significantly affect international relations by making any broadcast communications in the state open to decryption. For countries that extensively rely on encryption to secure military operations, diplomatic correspondence or other sensitive data, this could be a watershed event.

As quantum computers continue to improve, businesses and the general public will become increasingly aware of the threat cryptographic systems pose to all digital security globally. The ability to update cryptographic algorithms, keys and certificates quickly in response to advances in cracking techniques and processing speed will therefore be key.

To prepare for these inevitable cryptographic updates, more enterprises than ever will need to explore automation as a critical component for ensuring future-proofed security. Quantum resistant communication technology will soon be an inevitable part of cybersecurity mitigation.

Business and technology strategists must monitor progress on the evolution and potential implications of quantum computing starting now. Confidential data, over-the-air software updates, identity management systems, connected devices, and anything else with long-term security obligations must be made quantum safe before large quantum computers are developed and are reliable, meaning their error rates are low.

We have announced collaborations with ISARA Corporation and ID Quantique to make quantum-safe crypto more widely available for data protection in the cloud, applications and networks. Innovations like these can help combat the future security threats of quantum computing. With governments and organisations, such as NIST, racing to become cryptographically quantum resilient, readying enterprises for this change has never been more important.

You can find out more information on our quantum cybersecurity solutions here and if you have any other questions please feel free to tweet us @ThalesDigiSec.

*** This is a Security Bloggers Network syndicated blog from Enterprise Security Thales blog authored by Aline Gouget. Read the original post at: https://dis-blog.thalesgroup.com/security/2020/08/05/quantum-computing-and-the-evolving-cybersecurity-threat/

See the article here:
Quantum Computing and the evolving cybersecurity threat - Security Boulevard

Netherlands investigates innovative privacy technology SSI – ComputerWeekly.com

Dutch research organisation TNO is investigating concrete applications of self-sovereign identity (SSI) technology to make citizens lives easier, and enable organisations to make considerable savings in administrative processes.

SSI offers new ways for citizens to manage their privacy, eliminates the need to log in with passwords, and speeds up transactions over the internet and in real life.

We are investigating how SSI can be made suitable for applications, said Rieks Joosten, senior scientist in business information processes and information security at TNO. Perhaps the most important application is the electronic filling of administrative forms. If you want to apply for a mortgage, you need to gather all sorts of information to submit to the lender. Not only do you often have to fill in the same data repeatedly, you also need authorised documents, from your employer and the bank, for example.

Midway through last year, the Netherlands national ombudsman published a report, Keep it simple, which looking at the red tape that citizens face when doing business with government departments and businesses. The report showed that such processes are often time-consuming and frustrating for citizens.

But it is also costly for the parties who have to validate these forms, said Joosten. We estimate that Dutch organisations spend more than 1bn a year on validation.

Using SSI, this can be done more efficiently and effectively in the future. Behind it lie cryptographic technologies, for instance public-key cryptography, zero-knowledge proofs and often blockchain. These technologies give the user control over which personal data is shared with whom, while the recipient can quickly verify this data electronically.

This enables secure and efficient exchange of digital information, said Joosten. Parties can now get quality data that provably originates from organisations that they trust, and hasnt been changed in transit.

SSI can help companies to comply with European privacy legislation and save considerable costs on administrative processes. For citizens, the system saves a huge amount of time and frustration, and can prevent people from giving up in a complex administrative process and therefore not getting what they are entitled to. Also, they no longer have to log in with usernames and passwords.

Joosten added: You fill in a form because you want to get something, say a parking permit or a mortgage. This form is designed so that the provider can get answers to three questions. One, what do I get from you and what do you get from me? Two, do I value what I get more highly than what I give? And three, is the risk Im taking with this transaction acceptable to me?

This allows the provider to decide whether or not to provide what is requested, he said. SSI adds the ability to electronically annotate the form, allowing the provider to specify which organisations it trusts to provide what data.

The users SSI app can read these annotations and, after obtaining the users consent, gets that data from the users digital wallet and sends it to the providers web server, including electronically verifiable proofs of provenance and integrity. So the provider obtains quality data from a source that he or she trusts, said Joosten.

Several local solutions already exist that do this, he added. In the Netherlands, we have IRMA, in Belgium Its Me, and similar initiatives exist in other countries. They support local SSI markets, have their own infrastructure, their own governance and their own forms of credentials.

It resembles how data networks worked in the early days of the internet. We had local area networks [LANs], each using its own protocol. With the advent of IPv4, it became possible to send data across different LANs, all over the world. We are looking for an SSI network infrastructure that is not owned by a single party, and does for local solutions what IPv4 did for LANs.

Although the Netherlands, Germany and Belgium are leading the way in Europe with the development of SSI research and applications, Joosten sees the necessity of collaboration. Individual parties, large and small, need to contribute to the bigger picture, he said. We not only need technicians, but also visionaries and people with political and business knowledge.

Some of them will contribute to the horizontal SSI infrastructure, others to vertical SSI markets, and still others to make it all work together, so that SSI can grow organically. We work with lots of parties in communities such as the Dutch Blockchain Coalition or Techruption, consortia such as uNLock, programmes such as EBSI/ESSIF, in events such as Odyssey.org or Rebooting Web of Trust, and others.

Within its SSI Lab in Groningen, TNO works on components that could become part of the SSI infrastructure, integrating where possible with components that others are developing. Also, applications are being developed to support SSI marketplaces and for demonstration purposes.

The SSI Lab is not just for TNO, said Joosten. It provides a safe environment for other organisations to experiment with several technologies, allowing them to experience the state of the art and build a business case for themselves. Also, the SSI Lab develops mental models and other stories for the purpose of aligning the currently different and non-interoperable ways in which people think about SSI.

However, many technological and organisational challenges remain to be resolved before citizens, businesses and public authorities can benefit from SSI. We need to understand exactly how different individuals and organisations will use the same technology, and what needs have to be catered for, said Joosten. We must provide assurances regarding the security and integrity of the various user- and business apps, that can be verified at the business level. To find answers, we work together with many other parties.

Since November last year, the eSSIF-Lab has been launched, with European Union funding available for small enterprises and startups that want to build or improve SSI components. The aim is to create multiple open source interoperable SSI components that are actually used, said Joosten. In fact, the SSI Lab is entering Europe in this way.

Read the original post:
Netherlands investigates innovative privacy technology SSI - ComputerWeekly.com

Quantum Cryptography Market 2020 Industry Growth Demand, Top Players, Key Application, and Forecast to 2028 – Owned

A recent report published by QMI on quantum cryptography market is a detailed assessment of the most important market dynamics. After carrying out thorough research of quantum cryptography market historical as well as current growth parameters, business expectations for growth are obtained with utmost precision. The study identifies specific and important factors affecting the market for quantum cryptography during the forecast period. It can enable companies investing in quantum cryptography market to change their production and marketing strategies in order to envisage maximum growth.

Get Sample Copy of This Report @https://www.quincemarketinsights.com/request-sample-62405?utm_source=Pooja/PF

According to the report, thequantum cryptography market has been segmented, by component (solutions and services), by services (consulting and advisory, deployment and integration, and support and maintenance), by security type (network and application security), by vertical (government and defense, bfsi, retail, healthcare, automotive, others).

Insights about regional distribution of market:

The market has been segmented in major regions to understand the global development and demand patterns of this market.

For quantum cryptography market, the segments by region are for North America, Asia Pacific, Western Europe, Eastern Europe, Middle East, and Rest of the World. During the forecast period, North America, Asia Pacific and Western Europe are expected to be major regions on the quantum cryptography market.

North America and Western Europe have been one of the key regions with technological advancements in ICT, electronics & semiconductor sector. Factors like the use of advanced technology and presence of global companies to cater the potential end users are favourable for the growth of quantum cryptography market.Also, most of the leading companies have headquarters in these regions.

Company profiled in this report based on Business overview, Financial data, Product landscape,Strategic outlook & SWOT analysis:

Make an Inquiry for purchasing this Report @https://www.quincemarketinsights.com/enquiry-before-buying/enquiry-before-buying-62405?utm_source=Pooja/PF

Asia Pacific is estimated to be one of the fastest growing markets for quantum cryptography market. Major countries in the Asia Pacific region are China, Japan, South Korea, India and Australia. These economies in the APAC region are major contributors in the ICT, electronics & semiconductor sector. In addition to this, government initiatives to promote technological advancement in this region are also one of the key factors to the growth of quantum cryptography market. Middle East and rest of the World are estimated to be emerging regions for quantum cryptography market.

Market Segmentation:

ByComponent:

Solution and Services

ByServices:

Consulting and Advisory

Deployment and Integration

Support and Maintenance

By Security Type:

Network and Application Security

ByVertical:

Government and defense

BFSI

Retail

Healthcare

Automotive

Others

By Region:

North America

North America, by Country

US

Canada

Mexico

North America, by Component

North America, by Services

North America, by Security Type

North America, by Vertical

Western Europe

Western Europe, by Country

Germany

UK

France

Italy

Spain

The Netherlands

Rest of Western Europe

Western Europe, by Component

Western Europe, by Services

Western Europe, by Security Type

Western Europe, byVertical

Asia Pacific

Asia Pacific, by Country

China

India

Japan

South Korea

Australia

Indonesia

Rest of Asia Pacific

Asia Pacific, by Component

Asia Pacific, by Services

Asia Pacific, by Security Type

Asia Pacific, byVertical

Eastern Europe

Eastern Europe, by Country

Russia

Turkey

Rest of Eastern Europe

Eastern Europe, by Component

Eastern Europe, by Services

Eastern Europe, by Security Type

Eastern Europe, byVertical

Middle East

Middle East, by Country

UAE

Saudi Arabia

Qatar

Iran

Rest of Middle East

Middle East, by Component

Middle East, by Services

Middle East, by Security Type

Middle East, byVertical

Rest of the World

Rest of the World, by Country

South America

Africa

Rest of the World, by Component

Rest of the World, by Services

Rest of the World, by Security Type

Rest of the World, byVertical

Objectives of this report:

Reasons to Buy This Report:

Customization:

This study is customized to meet your specific requirements:

Contact UsQuince Market InsightsAjay D. (Knowledge Partner)Office No- A109,Pune, Maharashtra 411028Phone: +1 208 405 2835 /+441444390986 /+91 706 672 4848Email:[emailprotected]Web:www.quincemarketinsights.com

ABOUT US:QMI has the most comprehensive collection of market research products and services available on the web. We deliver reports from virtually all major publications and refresh our list regularly to provide you with immediate online access to the worlds most extensive and up-to-date archive of professional insights into global markets, companies, goods, and patterns.

See the original post here:
Quantum Cryptography Market 2020 Industry Growth Demand, Top Players, Key Application, and Forecast to 2028 - Owned

Encryption Software Market Trends, Growth Analysis, Business Strategies and Investment Opportunities till 2026 – The Daily Chronicle

Encryption Software Market is expected to exceed USD 21 billion by 2026. The market growth is attributed to supportive government initiatives to combat cybercrimes and the rising instances of data breaches globally. For example, in November 2019, Chinas State Cryptography Administration (SCA) published a draft of an encryption law, which will regulate encryption in the private & public sectors. The draft also set guidelines on the usage of cryptography to safeguard national security. The growing implementation of disk, email, and mobile encryption capabilities in security suites provided by the cybersecurity vendors to address the evolving threats will augment market growth.

Data privacy and protection are among the top-most priorities of todays tech-driven industries. With growing concerns, the encryption software industry is expected accrue sizeable proceeds in the coming years. In a bid to combat cases of data breaches and cyber frauds, various countries worldwide have started imposing stringent regulations. Authorities are even trying to create awareness by educating the population about cybercrimes.

Get sample copy of this research report @ https://www.decresearch.com/request-sample/detail/4484

Stating an example from China, in November 2019, the State Cryptography Administration (SCA) issued a draft for an encryption law that would regulate encryption in the public and private sectors. This draft would help Chinese authorities establish guidelines on the use of cryptography which in turn would protect national security.

Growing integration of email, mobile and disk encryption capabilities in various security suites for addressing evolving cyber threats across the retail, BFSI, and healthcare sectors could massively aid the encryption software market growth.

Over the years, these industry sectors have seen a healthy increase in the usage of data protection solutions in order to safeguard their non-sensitive/sensitive data. The encryption software market may USD 21 billion by 2026.

Proliferating demand for comprehensive security software solutions that can effectively safeguard users data from identity thefts, phishing and malware could drive the email encryption software market expansion. Analysts predict that the segment might own more than 25% of the overall encryption software market share by 2026.

Latin America encryption software market is expected to grow at a CAGR of over 18% from 2020 to 2026 due to the rising number of cyberattacks on the business-critical infrastructure, growing usage of digital platforms among enterprises to conduct business transactions, and supportive government initiatives to promote cybersecurity. For instance, since December 2019, the Mexican institutions including Mexico Central Bank, the National Defense Ministry (Sedena), Mexico Supreme Court, and the House of Representatives recorded more than 45 million attempted attacks to access databases and steal information.

The rapidly evolving threat landscape has compelled public & private enterprises to promote digital security to safeguard sensitive business information. The government agencies in the countries including Mexico, Brazil, and Argentina are introducing cybersecurity strategies to respond to a wide array of cyberattacks. For instance, in November 2017, the Mexican government presented the National Cyber Security Strategy in collaboration with the Inter-American Committee against Terrorism (CICTE). The strategy aims at establishing best practices to fight against cybercrimes.

Request for customization @ https://www.decresearch.com/roc/4484

The competition in the encryption software market is characterized by strategic partnerships, new product launches, and geographic expansion. For instance, in November 2019, Sophos partnered with Telefonica UK (O2) to provide its products & services to Telefonicas customers in the UK. The partnership enables the customers to gain access to Sophos Central cloud-based security platform to secure their organizations.

Table of Contents (ToC) of the report:

Chapter 5. Encryption Software Market, By Component

5.1. Key trends, by component

5.2. Software

5.2.1. Market estimates and forecast, 2015 2026

5.2.2. Endpoint encryption

5.2.2.1. Market estimates and forecast, 2015 2026

5.2.3. Email encryption

5.2.3.1. Market estimates and forecast, 2015 2026

5.2.4. Cloud encryption

5.2.4.1. Market estimates and forecast, 2015 2026

5.3. Service

5.3.1. Market estimates and forecast, 2015 2026

5.3.2. Training & consulting

5.3.2.1. Market estimates and forecast, 2015 2026

5.3.3. Integration & maintenance

5.3.3.1. Market estimates and forecast, 2015 2026

5.3.4. Managed service

5.3.4.1. Market estimates and forecast, 2015 2026

Chapter 6. Encryption Software Market, By Deployment Model

6.1. Key trends, by deployment model

6.2. On-premise

6.2.1. Market estimates and forecast, 2015 2026

6.3. Cloud

6.3.1. Market estimates and forecast, 2015 2026

Chapter 7. Encryption Software Market, By Application

7.1. Key trends, by application

7.2. IT & telecom

7.2.1. Market estimates and forecast, 2015 2026

7.3. BFSI

7.3.1. Market estimates and forecast, 2015 2026

7.4. Healthcare

7.4.1. Market estimates and forecast, 2015 2026

7.5. Retail

7.5.1. Market estimates and forecast, 2015 2026

7.6. Government & public sector

7.6.1. Market estimates and forecast, 2015 2026

7.7. Manufacturing

7.7.1. Market estimates and forecast, 2015 2026

7.8. Others

7.8.1. Market estimates and forecast, 2015 2026

Browse complete Table of Contents (ToC) of this research report @ https://www.decresearch.com/toc/detail/encryption-software-market

Read the original post:
Encryption Software Market Trends, Growth Analysis, Business Strategies and Investment Opportunities till 2026 - The Daily Chronicle