Proposed Bill Could Threaten Apple, Facebook Messaging Platforms – MSSP Alert

by DH Kass Feb 22, 2020

A bipartisan bill aimed at preventing online child exploitation could also blunt end-to-end encryption for messaging platforms and potentially strip tech companies of protection from prosecution for publishing certain content.

The Eliminating Abuse and Rampant Neglect of Interactive Technologies Act of 2019 (EARN IT Act) is co-sponsored by Senators Lindsey Graham (R-SC), chairman of the Senate Judiciary Committee, and Richard Blumenthal (D-CT). The senators have reportedly been quietly circulating a draft version of the bill to other lawmakers.

EARN IT would establish a 15-member National Commission on Online Child Exploitation Prevention to include the Chairman of the Federal Trade Commission, the Attorney General and the Secretary of Homeland Security, tasked with determining a set of best practices for providers of online services to battle child exploitation. Tech companies would have to comply with the best practices to retain Section 230 protection that shield them from prosecution for posting controversial content such as crimes, hate speech and extremism. Those that failed to adhere would be stripped of their Section 230 immunity and potentially prosecuted. The measure could affect a wide range of social media platforms and cloud service providers, including Apples iCloud and Facebooks WhatsApp, which together have nearly 2.5 billion users.

Its important to note that while Section 230 protects companies that host third-party content from legal liability for what their users say and do, it doesnt provide immunity against prosecutions under federal criminal law, or liability based on intellectual property law, communications privacy law, or certain sex trafficking laws.

The Electronic Frontier Foundation (EFF) is highly critical of the proposed bills impact, particularly its potential to undermine Section 230, which is widely regarded as a core tenet of Internet free speech. The EARN IT Act grants sweeping powers to the Executive Branch [and] opens the door for the government to require new measures to screen users speech and even backdoors to read your private communications, the EFF wrote in a blog post. Congress must forcefully reject this dangerous bill before it is introduced, the blog said.

In a Senate Judiciary hearing last December, a bipartisan group of senators signaled their intention to press tech companies to design product encryption to comply with court orders mandating access by authorized officials. Graham, in particular, warned Apple and Facebook: My advice to you is to get on with it, because this time next year, if we havent found a way that you can live with, we will impose our will on you.

So far, no solution has emerged that reconciles privacy with national security concerns. In 2016, a skirmish erupted between Apple and the Federal Bureau of Investigation when the iPhone maker refused to comply with a court order to unlock a terrorists device for law enforcement to view. Apple feared that an unlocked iPhone could compromise the security of millions of its users worldwide. In the incidents wake, both lawmakers and tech executives called for new legislation that would protect users privacy and assist law enforcement where none now exist.

EARN IT could be referenced to force providers of end-to-end encrypted messaging services to build in backdoors to their products, the EFF said. These demands would put encryption providers like WhatsApp and Signal in an awful conundrum: either face the possibility of losing everything in a single lawsuit or knowingly undermine their own users security, making all of us more vulnerable to criminals, the blog said.

More:
Proposed Bill Could Threaten Apple, Facebook Messaging Platforms - MSSP Alert

US legislation to fend off end-to-end encryption of Facebook, Google and others – Financial World

As a number of tech conglomerates including industry Goliaths such as Google LLC. alongside Facebook Inc., had been setting their eyes on an end-to-end encryption of their users messages and data, US congress has been set to introduce a bill over the coming weeks that would prevent the tech tycoons from offering end-to-end encryption as it looks to limit the scale of "children sexually abusive content" distributions through such platforms, at least two people familiar with the matter had unveiled late on Friday, the 21st of February 2020, on condition of anonymity as the sources were not authorized to speak publicly over the issue.

In point of fact, latest move of the US cabinet in effect would dilute impacts of a law called section 230 that had been safeguarding the tech tycoons from lawsuits related to distribution of potentially harmful contents as under the Section 230 law, certain online platforms could not be held liable for the contents posted, published delivered through their online platforms.

Concomitantly, the bill, which would be proposed by the Chair of Senate Judiciary Committee Lindsey Graham alongside a Democratic Senator Richard Blumenthal, would be duelling against the tech tycoons to hold them liable for the contents published and posted on their online platforms and to make them subjects to state prosecution alongside civil lawsuits, said the sources.

Visit link:
US legislation to fend off end-to-end encryption of Facebook, Google and others - Financial World

Cloud Encryption Technology Market Analysis with Key Players, Applications, Trends and Forecasts to 2025 | Gemalto, Sophos, Symantec – Nyse Nasdaq…

Reports Monitors report on the global Cloud Encryption Technology market studies past as well as current growth trends and opportunities to gain valuable insights of the same indicators for the Cloud Encryption Technology market during the forecast period from 2019 to 2024. The report provides the overall global market statistics of the global Cloud Encryption Technology market for the period of 20192024, with 2018 as the base year and 2024 as the forecast year. The report also provides the compound annual growth rate (CAGR) for the global Cloud Encryption Technology market during the forecast period.

SWOT Analysis of Leading Contenders covered in this report:- Gemalto, Sophos, Symantec, SkyHigh Networks, Netskope and more.

Get access to sample report, Click here @https://www.reportsmonitor.com/request_sample/480068

The global Cloud Encryption Technology market was xx million US$ in 2018 and is expected to xx million US$ by the end of 2024, growing at a CAGR of xx% between 2019 and 2024.

This report studies the Cloud Encryption Technology market size (value and volume) by players, regions, product types and end industries, history data 2014-2018 and forecast data 2019-2024; This report also studies the global market competition landscape, market drivers and trends, opportunities and challenges, risks and entry barriers, sales channels, distributors and Porters Five Forces Analysis.

Product Type Segmentation:-

SolutionServices

Industry Segmentation:-

BFSIHealthcare and LifesciencesMedia and EntertainmentRetail and E commerceAutomotive and ManufacturingIT and Telecom

The Cloud Encryption Technology market report includes an elaborate executive summary, along with a snapshot of the growth behavior of various segments included in the scope of the study. Furthermore, the report sheds light on changing competitive dynamics in the global Cloud Encryption Technology market. These indices serve as valuable tools for existing market players as well as for entities interested in entering the global Cloud Encryption Technology market.

Get a discount on this report@https://www.reportsmonitor.com/check_discount/480068

The report reaches inside into the competitive landscape of the global Cloud Encryption Technology market. Key players operating in the global Cloud Encryption Technology market have been identified, and each one of them has been profiled for their distinguishing business attributes. Company overview, financial standings, recent developments, and SWOTs are some of the attributes of players in the global Cloud Encryption Technology market that have been profiled in this report.

Regional Coverage:-

The report has been prepared after extensive primary and secondary research. Primary research involves the bulk of research efforts wherein, analysts carry out interviews with industry leaders and opinion-makers. Extensive secondary research involves referring to key players product literature, annual reports, press releases, and relevant documents to understand the global Cloud Encryption Technology market.

Secondary research also includes Internet sources, statistical data from government agencies, websites, and trade associations. Analysts have employed a combination of top-down and bottom-up approaches to study various phenomena in the global Cloud Encryption Technology market.

Key Questions Answered in Cloud Encryption Technology Market Report

View this report with a detailed description and TOC @ https://www.reportsmonitor.com/report/480068/Cloud-Encryption-Technology-Market

Contact UsJay MatthewsDirect: +1 513 549 5911 (U.S.)+44 203 318 2846 (U.K.)Email: [emailprotected]

Read more here:
Cloud Encryption Technology Market Analysis with Key Players, Applications, Trends and Forecasts to 2025 | Gemalto, Sophos, Symantec - Nyse Nasdaq...

The view of quantum threats from the front lines – JAXenter

The future is here. Or just about. After a number of discoveries, researchers have proven that quantum computing is possible and on its way. The wider world did not pause long on this discovery: Goldman Sachs, Amazon, Google, and IBM have just announced their own intentions to embark on their own quantum developments.

Now that its within our reach we have to start seriously considering what that means in the real world. Certainly, we all stand to gain from the massive benefits that quantum capabilities can bring, but so do cybercriminals.

Scalable quantum computing will defeat much of modern-day encryption, such as the RSA 2048 bit keys, which secure computer networks everywhere. The U.S. National Institute of Standards and Technology says as much, projecting that quantum in this decade will be able to break the protocols on which the modern internet relies.

The security profession hasnt taken the news lying down either. Preparations have begun in earnest. The DigiCert 2019 Post Quantum Cryptography (PQC) Survey aimed to examine exactly how companies were doing. Researchers surveyed 400 enterprises, each with 1,000 or more employees, across the US, Germany and Japan to get answers. They also conducted a focus group of nine different IT managers to further reveal those preparations.

SEE ALSO:DevSecOps Panel Best DevOps Security Practices & Best Tools

An encouraging development is that 35 percent of respondents already have a PQC budget, and a further 56 percent are discussing one in their organisations. Yet, many are still very early in the process of PQC planning. An IT manager within a manufacturing company said, We have a budget for security overall. Theres a segment allotted to this, but its not to the level or expense that is appropriate and should be there yet.

The time to start preparing, including inquiring of your vendors readiness for quantum computing threats, is now. One of the respondents, an IT Security manager at a financial services company, told surveyors, Were still in the early discussion phases because were not the only ones who are affected. There are third party partners and vendors that were in early discussions with on how we can be proactive and beef up our security. And quantum cryptology is one of the topics that we are looking at.

Others expanded upon that, noting that their early preparations heavily involve discussing the matter with third parties and vendors. Another focus group member, an IT manager at an industrial construction company, told the group, We have third party security companies that are working with us to come up with solutions to be proactive. So obviously, knock on wood, nothing has happened yet. But we are definitely always proactive from a security standpoint and were definitely trying to make sure that were ready once a solution is available.

Talking to your vendors and third parties should be a key part of any organisations planning process. To that end, organisations should be checking whether their partners will keep supporting and securing customers operations into the age of quantum.

The data itself was still at the centre of respondents minds when it came to protection from quantum threats, and when asked what they were focusing on in their preparations, respondents said that above all they were monitoring their own data. One respondent told us, The data is everything for anybody thats involved in protecting it. And so you just have to stay on top of it along with your vendors and continue to communicate.

One of the prime preparatory best practices that respondents called upon was monitoring. Knowing what kind of data flows within your environment, how its used and how its currently protected are all things that an enterprise has to find out as they prepare.

SEE ALSO:As quantum computing draws near, cryptography security concerns grow

To be sure, overhauling an enterprises cryptographic infrastructure is no small feat, but respondents listed understanding their organisations level of crypto agility as a priority. Quantum might be a few years off, but becoming crypto agile may take just as long.

Organisations will have to plan for a system which can easily swap out, integrate and change cryptographic algorithms within an organisation. Moreover, it must be able to do so quickly, cheaply and without any significant changes to the broader system. Practically, this means installing automated platforms which follow your cryptographic deployments so that you can remediate, revoke, renew, reissue or otherwise control any and all of your certificates at scale.

Many organisations are still taking their first tentative steps, and others have yet to take any. Now is the time for organisations to be assessing their deployments of crypto and digital certificates so they have proper crypto-agility and are ready to deploy quantum-resistant algorithms soon rather than being caught lacking when it finally arrives.

View original post here:
The view of quantum threats from the front lines - JAXenter

The top 5 technologies that will change health care over the next decade – MarketWatch

The past decade was about the rise of digital health technology and patient empowerment. The next decade will be about artificial intelligence, the use of health sensors and the so-called Internet of Healthy Things and how it could improve millions of lives.

The cultural transformation of health care we call digital health has been changing the hierarchy in care into an equal-level partnership between patients and physicians as 21st century technologies have started breaking down the ivory tower of medicine. But these milestones are nothing compared with what is about to become reality.

With advancements in exoskeleton technology, AIs ever-increasing importance in health care, and technologies like 5G and quantum computing soon going mainstream, theres much to be excited about.

Here are the five biggest themes for health and medicine for the next 10 years.

Artificial intelligence in medicine

Developments in artificial intelligence will dominate the next decade. Machine learning is a method for creating artificial narrow intelligence -- narrow refers to doing one task extremely well and a field of computer science that enables computers to learn without being explicitly programmed, building on top of computational statistics and data mining. The field has different types: it could be supervised, unsupervised, semi-supervised or reinforcement learning, among others. It has an unprecedented potential to transform health-care processes and medical tasks in the future and it has already started its invisible revolution.

If we consider how AlphaGo, the AI developed by Googles DeepMind lab, beat world champion Lee Sedol at the classic Chinese game Go by coming up with inventive moves that took experts by surprise, we can get a glimpse at what AI can hold for health care. Such moves were made possible by the combination of neural networks and reinforcement learning that this AI uses. This enabled the software to operate without the restrictions of human cognitive limitations, devise its own strategy and output decisions that baffled experts.

We can expect to see the same surprises in medical settings. Imagine new drugs designed by such algorithms; high-level analysis of tens of millions of studies for a diagnosis; or drug combinations nobody has thought of before. When applied to medicine, an algorithm trained via reinforcement learning could discover treatments and cures for conditions when human medical professionals could not. Cracking the reasoning behind such unconventional and novel approaches will herald the true era of art in medicine.

In global health, for example, an algorithm can provide a reliable map of future measles outbreak hot spots. It uses statistics on measles vaccination rates and disease outbreaks from the Centers for Disease Control and Prevention, as well as non-traditional health data, including social media and a huge range of medical records. Thats just one example, but the field is already buzzing with smart algorithms that can facilitate the search for new drug targets; improve the speed of clinical trials or spot tumors on CT scans.

However, while experts believe that AI will not replace medical professionals, it also seems true that medical professionals who use AI will replace those who dont.

A myriad of health sensors

Medical technology went through an amazing development in the 2010s, and theres now no single square centimeter of the human body without quantifiable data. For example, AliveCors Kardia and Apple Watch measure ECG and detect atrial fibrillation with high sensitivity. The EKO Core digital stethoscope records heart and lung sounds as a digital stethoscope, while blood pressure is monitored with the Omron Blood Pressure Smartwatch, the MOCAcare pocket sensor, and blood pressure cuff, the iHealth Clear, the Skeeper, a pocket cardiologist, or the Withings Blood Pressure Monitor, and of course, dozens of traditional blood pressure cuffs.

There are dozens of health trackers for respiration, sleep and, of course, movement. And while researchers cant decipher your dreams yet they are working on it, alongside figuring out all kinds of brain activity. For example, through EEG. Thats a method that records electrical activity in the brain using electrodes attached externally to the scalp. The NeuroSky biosensor and the Muse headband use it to understand the mind better and in the latter case allow for more effective meditation. As you see, theres not much left unmeasured in your body and it will even intensify in the future. For example, we expect digital tattoos to become commercially available within five years, which will not only measure the majority of the above-mentioned vital signs, but they will do so continuously. These tiny sensors will notify us when something is about to go wrong and we will need medical advice or intervention.

Moreover, with developments in 3-D printing as well as circuit-printing technologies, flexible electronics and materials, applying so-called digital tattoos or electronic tattoos on the skin for some days or even weeks became possible.

Made of flexible, waterproof materials impervious to stretching and twisting coupled with tiny electrodes, digital tattoos are able to record and transmit information about the wearer to smartphones or other connected devices. While these are only in use in research projects, they could allow health-care experts to monitor and diagnose critical health conditions such as heart arrhythmia, heart activities of premature babies, sleep disorders and brain activities noninvasively. Moreover, by tracking vital signs 24 hours a day, without the need for a charger, it is especially suited for following patients with high risk of stroke, for example. Although we are not there yet, there are certain promising solutions on the market such as MC10s BioStampRC Sensor.

Quantum computing puts medical decision-making on a new level

In 2019, Google claimed quantum supremacy and made the cover of Nature magazine. One example of how this technology will have a major impact on the health-care sector is quantum computing taking medical decision-making to a whole new level and even augmenting it with special skills. What if such computers could offer perfect decision support for doctors? They could skim through all the studies at once, they could find correlations and causations that the human eye would never find, and they might stumble upon diagnoses or treatment options that doctors could have never figured out by themselves.

At the very endpoint of this development, quantum computers could create an elevated version of PubMed, where information would reside in the system but not in the traditional written form it would reside in qubits of data as no one except the computer would read the studies anymore.

In addition, the applications of quantum computing to health care are manifold, ranging from much faster drug design to quicker and cheaper DNA sequencing and analysis to reinforced security over personal medical data. While the technology does hold such promises, we still have to be patient before practical solutions can be implemented in medicine. However, with continued progress in this area, even though quantum computing has been something from a science fiction novel, this decade will see the first such computer used in the clinical practice too.

Chatbots as the first line of care

Symptom checkers that function on the same principle as chatbots are already available, free of charge. However, these rely on the user inputting symptoms and complaints manually. We yearn for one that can make predictions and suggestions based on a users data, like sleep tracking, heart rate and activity collected via wearables. With such features, those bots can help users make healthier choices without having to drag themselves to their doctor.

There was a Black Mirror episode titled Rachel, Jack, and Ashley Too that featured an incredibly smart and emotional chatbot that had human-like conversations with the character. Think about having a similar personalized chatbot thats accessible via your smart device and with additional health and lifestyle features. This chatty virtual being can wake you up at the appropriate time based on your sleep pattern and advise you to take your antihistamines as the pollen concentration is particularly high during your commute that day, before you even get out of bed. It can even recommend what you should consume for each meal based on your nutrigenomic profile. It could find the best words for you to motivate you to go to the gym. It could find the best jokes that help you get into a good mood. But would you rather bend to the rules of an AI, essentially forgoing your freedom of choice, than experience life based more on your own will?

5G serving the whole ecosystem of digital health

5G networks will enable data to be downloaded at more than 1 gigabit per second (1gb/s), allowing for downloads 10 to 100 times faster than the currently available 4G services. 4G networks can only serve around a thousand devices within a square kilometer, while 5G can serve a million. It will make the era of the Internet of Things possible by connecting a huge amount of health trackers with laptops, smartphones and many more digital devices. There will be no connection issues or latency, as the trackers will be able to work in harmony while getting the most out of our data.

Such a boost will allow for more reliable communication, which is a must in areas like telesurgery, remote consultation and remote monitoring. With bigger bandwidth and faster connection, there might be a boost in wearables as health IoT networks become more stable and reliable, and further help with patient engagement in relation to their health.

Major applications of 5G are expected to be apparent starting in 2021.

Dr. Bertalan Mesko, Ph.D., is The Medical Futurist and director of The Medical Futurist Institute, analyzing how science fiction technologies can become reality in medicine and healthcare. As a geek physician with a Ph.D. in genomics, he is a keynote speaker and an Amazon Top-100 author.

Follow this link:
The top 5 technologies that will change health care over the next decade - MarketWatch

Magnetic photon trick could take computers to the next level – Futurity: Research News

Share this Article

You are free to share this article under the Attribution 4.0 International license.

For the first time, researchers have created a pseudo-magnetic force that can precisely control photons.

To develop futuristic technologies like quantum computers, scientists will need to find ways to control photons, the basic particles of light, just as precisely as they can already control electrons, the basic particles in electronic computing.

Unfortunately, photons are far more difficult to manipulate than electrons, which respond to forces as simple as the sort of magnetism that even children understand.

What weve done is so novel that the possibilities are only just beginning to materialize.

In the short term, the new control mechanism could send more internet data through fiber optic cables. In the future, this discovery could lead to the creation of light-based chips that would deliver far greater computational power than electronic chips.

What weve done is so novel that the possibilities are only just beginning to materialize, says Avik Dutt, a postdoctoral scholar at Stanford University and first author of the paper in Science.

Essentially, the researchers tricked the photonswhich are intrinsically non-magneticinto behaving like charged electrons. They accomplished this by sending the photons through carefully designed mazes in a way that caused the light particles to behave as if what the scientists called a synthetic or artificial magnetic field were acting upon them.

We designed structures that created magnetic forces capable of pushing photons in predictable and useful ways, says Shanhui Fan, a professor of electrical engineering at Stanford University and senior scientist behind the research effort.

Although still in the experimental stage, these structures represent an advance on the existing mode of computing. Storing information is all about controlling the variable states of particles, and today, scientists do so by switching electrons in a chip on and off to create digital zeroes and ones.

A chip that uses magnetism to control the interplay between the photons color (or energy level) and spin (whether it is traveling in a clockwise or counterclockwise direction) creates more variable states than is possible with simple on-off electrons. Those possibilities will enable scientists to process, store and transmit far more data on photon-based devices than is possible with electronic chips today.

To bring photons into the proximities required to create these magnetic effects, the researchers used lasers, fiber optic cables, and other off-the-shelf scientific equipment. Building these tabletop structures enabled the scientists to deduce the design principles behind the effects they discovered.

Eventually theyll have to create nanoscale structures that embody these same principles to build the chip.

In the meantime, says Fan, weve found a relatively simple new mechanism to control light, and thats exciting.

Source: Stanford University

More here:
Magnetic photon trick could take computers to the next level - Futurity: Research News

U.S. Progress on AI and Quantum Computing Will Best China, Says CTO Michael Kratsios – BroadbandBreakfast.com

WASHINGTON, February 21, 2020 - U.S. Chief Technology Officer Michael Kratsios expressed confidence in the supremacy of the U.S.s artificial intelligence and quantum computing programs over Chinas, in a talk at the Hudson Institute on Thursday.

United States research on AI and quantum computing features the most highly cited papers, most investment by the private sector, and greatest government funding, he said.

This assertion challenges the Made in China 2025 Initiative, a 10-year plan that China issued in 2015, and which outlined 10 key tech industries in which China hopes to become a world leader.

Recent progress by the Chinese government in the field of high-speed fiber-optic broadband, AI and surveillance have fueled some analysts fears that the Chinese will hit their targets.

Kratsios laid out four key components of a winning tech strategy in which the U.S. excels: Leadership development, a low-regulatory environment, a belief in the power of the citizen workforce, and international engagement with allies.

Kratsios referenced two specific examples to bolster his argument. He mentioned how Trump committed to at least $200 million for STEM education last year, and how American corporations more than matched that figure by donating $300 million.He also recounted the story that he said put America at the head of the pack in the quantum supremacy race. The story bears upon the uniting of resources invested by the U.S. government in the Quantum Lab at UC Santa Barbara with Googles subsequent acquisition of the lab and connection of that research team to its treasure trove of resources.

Its not a James Bond/Jason Bourne crossover, but the concept of quantum supremacy is vital for national security, Kratsios said. America has only achieved it through a free market of ideas involving prudent government investing and private sector intervention.

Governmental funding and R&D are unique in that they fill the gaps that the private sector doesnt focus on.

Kratsios elaborated that the government tends to invest in early-stage, pre-competitive R&D which it expects the private sector to nurture and raise into a mature industry, such as in the case of the UCSB Quantum Lab.

Kratsios alsomade some comments on the proposals that the EU released Wednesday regarding AI and data. He characterized their approach to AI as values-based, and worried that they do not prioritize implementation.

Kratsios also found fault with the documents binary approach to classifying AI as high risk or not high risk, saying the report clumsily attempts to bucket AI-powered technology into two camps when there should be more spectrum and flexibility in the model.

The rest is here:
U.S. Progress on AI and Quantum Computing Will Best China, Says CTO Michael Kratsios - BroadbandBreakfast.com

Global Cloud Tipping Point: the 2020 Thales Data Threat Report-global Edition Shows Organizations Struggle With Security Post Digital Transformation -…

According to the 2020 Thales Data Threat Report Global Edition with research and analysis by IDC, organizations reached a global cloud tipping point causing them to struggle with security challenges of digital transformation (DX). Today, half (50%) of all corporate data is stored in the cloud and nearly half (48%) of that data is considered sensitive. With multi-cloud usage becoming the new normal for companies, all respondents said at least some of the sensitive data stored in the cloud is not encrypted and 49% globally indicated that they have experienced a breach. In addition to DX and multi-cloud complexities, the global study shows that quantum computing has skyrocketed as a major concern with 72% of organizations claiming it will affect their security and cryptographic operations in the next five years.

This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20200224005433/en/

(Photo: Business Wire)

Thales will host a webinar, "The Global State of Data Security: Zero Trust in a Multi-Cloud World," to discuss the global report in more detail on Thursday, March 5 at 11:00 a.m. ET. To join, please visit the registration page.

The rush for digital transformation and the security fallout

With input from 1,723 executives with responsibility for, or influence over, IT and data security around the world, this years threat report dove deeper into the specific security challenges resulting from the "DX Era." The report revealed that the more digitally transformed, the more likely an organization is to be breached. While organizations pursing DX are capturing competitive advantages, the worldwide rush to implement disruptive technologies is creating new vulnerabilities resulting in data breaches and compliance audit failures. According to the report, 45% of organizations in the top two DX categories, Software as a Service (SaaS) and social media, experienced a breach in the past year.

Multi-cloud is the new normal, but a top barrier to data security

Companies are using multiple Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) environments, as well as hundreds of SaaS applications. Eighty-one percent are using more than one IaaS vendor (the U.S. figure is 86%), 81% have more than one PaaS vendor (the U.S. figure is 86%), and 11% have more than 100 SaaS applications to manage. As more data migrates to the cloud, security becomes more complex. Nearly 40% of respondents rate complexity as their top perceived barrier to implementing data security, down slightly from 44% last year.

Quantum computing is on the horizon

The global report draws new attention to the anticipated impact of quantum computing. Within the next five years, 72% of organizations believe quantum computing power will affect their data security operations while 27% see it as a threat within the next year, highlighting the need for organizations to improve their post-quantum encryption strength.

Not all industries are embracing digital transformation at the same rate

The 2020 Thales Data Threat Report-Global Edition also explores how government, financial services, healthcare, and retail sectors embrace digital transformation in varying degrees and the associated security challenges. Global federal government organizations view themselves as most advanced, with nearly half (49%) of government respondents as either aggressively disrupting the markets they participate in, or are embedding, digital capabilities that enable greater enterprise agility. Healthcare followed closely at 47%, retail at 45%, and financial services at 30%. Fifty- four percent of financial services respondents experienced a data breach or failed compliance audit this year, followed by government at 52%, retail at 49%, and healthcare at just 37%.

Story continues

Key takeaways for improving data security

Data security is challenging, but across big data, IoT and containers, encryption is a key driver for adoption and usage. Based on this years findings, IDC recommends the following key strategies for security professionals:

For more key findings and security best practices, download a copy of the 2020 Thales Data Threat Report Global Edition.

"As organizations face expanding and more complex cybersecurity challenges because of multi-cloud adoption and digital transformation, they need smarter and better ways to approach data protection. Zero trust is a fantastic initiative to authenticate and validate the users and devices accessing applications and networks but does little to protect sensitive data should those measures fail. Employing robust data discovery, hardening, data loss prevention, and encryption solutions provide an appropriate foundation for data security, completing the objective of pervasive cyber protection."

Frank Dickson, program vice president, cybersecurity products, IDC

"The Thales 2020 Data Threat Report-Global Edition clearly demonstrates that unprecedented amounts of sensitive data are being stored in multi-cloud environments by organizations all over the world. Having the right cloud security in place has never been more critical. As 5G networks are rolled out, IoT continues to expand and quantum computing creeps closer to becoming a reality, organizations must adopt a more modern data protection mindset. The first step towards protecting sensitive data is knowing where to find it. Once classified, this data should be encrypted and protected with a strong multi-cloud key management strategy."

Tina Stewart, vice president of global market strategy for cloud protection and licensing activity at Thales

Industry insight and views on the latest data security trends can be found on the Thales blog at blog.thalesesecurity.com.

Follow Thales on Twitter, LinkedIn, Facebook and YouTube.

About Thales

Thales (Euronext Paris: HO) is a global technology leader shaping the world of tomorrow today. The Group provides solutions, services and products to customers in the aeronautics, space, transport, digital identity and security, and defence markets. With 80,000 employees in 68 countries, Thales generated sales of 19 billion in 2018 (on a pro forma basis including Gemalto).

Thales is investing in particular in digital innovations connectivity, Big Data, artificial intelligence and cybersecurity technologies that support businesses, organisations and governments in their decisive moments.

View source version on businesswire.com: https://www.businesswire.com/news/home/20200224005433/en/

Contacts

PRESS Thales, Media Relations Security Constance Arnoux+33 (0)6 07 34 00 34vanessa.viala@thalesgroup.com

Follow this link:
Global Cloud Tipping Point: the 2020 Thales Data Threat Report-global Edition Shows Organizations Struggle With Security Post Digital Transformation -...

Scientists Have Discovered a Brand New Electronic State of Matter – ScienceAlert

Scientists have observed a new state of electronic matter on the quantum scale, one that forms when electrons clump together in transit, and it could advance our understanding and application of quantum physics.

Movement is key to this new quantum state. When electric current is applied to semiconductors or metals, the electrons inside usually travel slowly and somewhat haphazardly in one direction.

Not so in a special type of medium known as aballistic conductor, where the movement is faster and more uniform.

The new study shows how in very thin ballistic conducting wires, electrons can gang up creating a whole new quantum state of matter made solely from speeding electrons.

"Normally, electrons in semiconductors or metals move and scatter, and eventually drift in one direction if you apply a voltage," says physicist Jeremy Levy, from the University of Pittsburgh. "But in ballistic conductors the electrons move more like cars on a highway."

"The discovery we made shows that when electrons can be made to attract one another, they can form bunches of two, three, four and five electrons that literally behave like new types of particles, new forms of electronic matter."

Ballistic conductors can be used for stretching the boundaries of what's possible in electronics and classical physics, and the one used in this particular experiment was made from lanthanum aluminate and strontium titanate.

Interestingly, when the researchers measured the levels of conductance they found they followed one of the most well-known patterns in mathematics Pascal's triangle. Asconductanceincreased, it stepped up in a pattern that matches one of the rows of Pascal's triangle, following the order 1, 3, 6, 10 and so on.

"The discovery took us some time to understand but it was because we initially did not realise we were looking at particles made up of one electron, two electrons, three electrons and so forth," says Levy.

This clumping of electrons is similar to the way that quarks bind together to form neutrons and protons, according to the researchers. Electrons in superconductors can team up like this too, joining together in pairs to coordinate movement.

The findings may have something to teach us about quantum entanglement, which in turn is key to making progress with quantum computing and a super-secure, super-fast quantum internet.

According to Levy, it's another example of how we're reverse engineering the world based on what we've found from the discovery of the fundamentals of quantum physics building on important work done in the last few decades.

"Now in the 21st century, we're looking at all the strange predictions of quantum physics and turning them around and using them," says Levy.

"When you talk about applications, we're thinking about quantum computing, quantum teleportation, quantum communications, quantum sensing ideas that use the properties of the quantum nature of matter that were ignored before."

The research has been published in Science.

Read the original here:
Scientists Have Discovered a Brand New Electronic State of Matter - ScienceAlert

Quantum Computing Market Overview By New Technology, Demand And Scope 2020 To 2026 – Instant Tech News

Quantum Computing Marketreport to study and analyses the market size (Consumption, Value, Volume andProduction) By Company, Key Regions, Products and End User/Application, Quantum Computing market breakdown data from 2014 to 2019, and 6 year forecast from 2020 to 2026. BedsidesQuantum Computing industryresearch report enriched on worldwide competition by topmost prime manufactures (D-Wave Systems, Google, IBM, Intel, Microsoft, 1QB Information Technologies, Anyon Systems, Cambridge Quantum Computing, ID Quantique, IonQ, QbitLogic, QC Ware, Quantum Circuits, Qubitekk, QxBranch, Rigetti Computing) which providing information such asCompany Profiles, Gross, Gross Margin, Capacity, Product Picture and Specification, Production, Price, Cost, Revenueand contact information.Quantum Computing Market report provide the in-depth analysis of key factors influencing the growth of the market (Growth Potential, Opportunities, Drivers, Industry-Specific Challenges and Risks).

Get Free Sample PDF (including full TOC, Tables and Figures)of Quantum Computing[emailprotected]https://www.researchmoz.us/enquiry.php?type=S&repid=2040997

The Latest Quantum Computing Industry Data Included in this Report:Quantum Computing Market Size & Analysis (2014 2026); Quantum Computing Market Volume & Future Trends (2014 2026); Quantum Computing Market; By Geography (Volume and Value); 2014 2026; Quantum Computing Market Opportunity Assessment (2014 2026); Quantum Computing (Installed Base) Market Share: By Company; Major Deals in Quantum Computing Market; Quantum Computing Reimbursement Scenario; Quantum Computing Current Applications; Quantum Computing Competitive Analysis: By Company; Key Market Drivers and Inhibitors; Major Companies Analysis.

Scope of Quantum Computing Market:Quantum computing is a technology that applies the laws of quantum mechanics to computational ability. It includes three states, namely 1, 0 as well as the superposition of 1 and 0. Superposition indicates that two states exist at the same time. These bits are known as quantum bits or qubits. The global quantum computing market consists of the hardware that is required to develop quantum computers and its peripherals.

North America accounted for the largest share of the overall quantum computing market in 2017. On the other hand, Asia Pacific (APAC) would be the fastest growing region for quantum computing during the forecast period. This growth can be attributed to the increasing demand for quantum technology to solve the most tedious and complex problems in the defense and banking & finance industry.

On the basis of product type, this report displays the shipments, revenue (Million USD), price, and market share and growth rate of each type.

Hardware Software Services

On the basis on the end users/applications,this report focuses on the status and outlook for major applications/end users, shipments, revenue (Million USD), price, and market share and growth rate foreach application.

Defense Healthcare & pharmaceuticals Chemicals Banking & finance Energy & power

Do You Have Any Query Or Specific Requirement? Ask to Our Industry[emailprotected]https://www.researchmoz.us/enquiry.php?type=E&repid=2040997

Quantum Computing Market: Regional analysis includes:

Table of Content:

And Many More.

Contact:

ResearchMozMr. Nachiket Ghumare,Tel: +1-518-621-2074USA-Canada Toll Free: 866-997-4948Email:[emailprotected]

Browse More Reports Visit @https://www.mytradeinsight.blogspot.com/

Continue reading here:
Quantum Computing Market Overview By New Technology, Demand And Scope 2020 To 2026 - Instant Tech News