How this researcher’s pursuit of ‘what if?’ led to a career in cybersecurity – Siliconrepublic.com

Dr Elizabeth OSullivan of Allstate Northern Ireland is using the latest knowledge in cryptography and AI to develop data protection as a service.

Elizabeth OSullivan studied computational mathematics at undergraduate level, before embarking on a PhD in theoretical and computational physics at Queens University Belfast (QUB). Since 2007, she has specialised in the area of cybersecurity and led research and development in software security at QUB and was co-investigator on the EU-funded Horizon 2020 SAFEcrypto project.

She now leads Allstates cybersecurity innovation and analytics work in Northern Ireland to develop new capabilities and services in advanced cryptography and cybersecurity analytics. As a Fulbright TechImpact Scholar, OSullivan will conduct research on cybersecurity policy and governance in financial services at Boston College. The application period for 2021-2022 Fulbright Irish Awardsopened on 31 August 2020.

We must get better at bridging the gap between academia and industry ELIZABETH OSULLIVAN

It certainly wasnt the plan. As I progressed through my undergraduate studies, I was constantly facing gaps in my knowledge and problems that I initially couldnt solve. I often had to spend long hours working with and thinking through complex problems in mathematics or coding.

The feeling of being able to overcome my own limitations gave me a tremendous sense of personal achievement; a mental high. I remember specifically working on a final-year project in numerical analysis that combined my evolving subject matter expertise in both coding and mathematics.

I had understood the theory of the problem quite well at the start, or so I thought. Having to translate the theory into working computer code, examine known test cases, think about edge cases and following the path of pure what if? opened up a whole new level of understanding, excitement and a sense of exploration.

From that moment onwards, I just havent stopped asking myself what if?

My research focuses on security and privacy mechanisms to support scalable, real-time, high-assurance analytics. It is a fusion of cryptographic protection technologies and detection techniques using machine learning.

I joined Allstate, a financial services institution, in 2017. My team has taken a platform-based approach to provide data protection as a service for enterprise to abstract the complexities of cryptographic technologies and anomaly detection.

This platform-based approach allows us to easily investigate emerging techniques from advanced research on real-world settings in addition to developing our own methods.

Cybersecurity is a global challenge. Technology is radically transforming society, however the rapid pace of digitisation has created fundamental challenges in core issues such as trust, identity, security and privacy.

The failure to address these issues will have a profound impact on business growth and society as a whole. We are already seeing disturbing effects at all levels and cyberspace is becoming increasingly adversarial.

As a result, we are seeing an increase in security and privacy regulations. However, we must ensure that these regulations are consistent and coordinated so that they achieve the desired effect.

During my 2020-2021 Fulbright TechImpact Award to Boston College, I will engage with a range of key stakeholders to drive consistency and clarity in this space.

My research has significant commercial investment from Allstate. However, my vision is to prepare the environment where I can foster greater partnership between academia, start-ups and industry.

Many state-of-the-art techniques from academia never translate to industry because the environment is not right; conversely, industry needs to keep abreast for innovation. We must get better at bridging this gap.

Cybersecurity is a diverse and rapidly evolving field. There will always be practical constraints when implementing security in real-world systems, therefore systems will always be exploitable.

Many attacks we see in the media are preventable, but some attacks can exploit systems in ways never thought of before. When you develop any security mechanism, whether it be an algorithm, protocol or system, if it is widely used, it will be hacked. You must prepare for that as best you can, but prepare for it no less.

That by entering this field you will learn how to hack. Most of todays attacks and hacks are fully automated and malicious intent is more important than skill to do harm. Designing a system that can withstand continual attack, that is real skill.

Id like to see more research in privacy-enhancing technologies in real-world environments. For this to happen we need the cooperation of public-private partnerships. There has been tremendous advances made in the development of these technologies, but we need to know more about their applicability and performance in practical use cases.

Are you a researcher with an interesting project to share? Let us know by emailing editorial@siliconrepublic.com with the subject line Science Uncovered.

See the article here:
How this researcher's pursuit of 'what if?' led to a career in cybersecurity - Siliconrepublic.com

What is the quantum internet? Everything you need to know about the weird future of quantum networks – ZDNet

It might all sound like a sci-fi concept, but building quantum networks is a key ambition for many countries around the world. Recently the US Department of Defense (DoE) published the first blueprint of its kind, laying out a step-by-step strategy to make the quantum internet dream come true, at least in a very preliminary form, over the next few years.

The US joined the EU and China in showing a keen interest in the concept of quantum communications. But what is the quantum internet exactly, how does it work, and what are the wonders that it can accomplish?

WHAT IS THE QUANTUM INTERNET?

The quantum internet is a network that will let quantum devices exchange some information within an environment that harnesses the weird laws of quantum mechanics. In theory, this would lend the quantum internet unprecedented capabilities that are impossible to carry out with today's web applications.

SEE: Managing AI and ML in the enterprise 2020: Tech leaders increase project development and implementation (TechRepublic Premium)

In the quantum world, data can be encoded in the state of qubits, which can be created in quantum devices like a quantum computer or a quantum processor. And the quantum internet, in simple terms, will involve sending qubits across a network of multiple quantum devices that are physically separated. Crucially, all of this would happen thanks to the whacky properties that are unique to quantum states.

That might sound similar to the standard internet. But sending qubits around through a quantum channel, rather than a classical one, effectively means leveraging the behavior of particles when taken at their smallest scale so-called "quantum states", which have caused delight and dismay among scientists for decades.

And the laws of quantum physics, which underpin the way information will be transmitted in the quantum internet, are nothing short of unfamiliar. In fact, they are strange, counter-intuitive, and at times even seemingly supernatural.

And so to understand how the quantum ecosystem of the internet 2.0 works, you might want to forget everything you know about classical computing. Because not much of the quantum internet will remind you of your favorite web browser.

WHAT TYPE OF INFORMATION CAN WE EXCHANGE WITH QUANTUM?

In short, not much that most users are accustomed to. At least for the next few decades, therefore, you shouldn't expect to one day be able to jump onto quantum Zoom meetings.

Central to quantum communication is the fact that qubits, which harness the fundamental laws of quantum mechanics, behave very differently to classical bits.

As it encodes data, a classical bit can effectively only be one of two states. Just like a light switch has to be either on or off, and just like a cat has to be either dead or alive, so does a bit have to be either 0 or 1.

Not so much with qubits. Instead, qubits are superposed: they can be 0 and 1 simultaneously, in a special quantum state that doesn't exist in the classical world. It's a little bit as if you could be both on the left-hand side and the right-hand side of your sofa, in the same moment.

The paradox is that the mere act of measuring a qubit means that it is assigned a state. A measured qubit automatically falls from its dual state, and is relegated to 0 or 1, just like a classical bit.

The whole phenomenon is called superposition, and lies at the core of quantum mechanics.

Unsurprisingly, qubits cannot be used to send the kind of data we are familiar with, like emails and WhatsApp messages. But the strange behavior of qubits is opening up huge opportunities in other, more niche applications.

QUANTUM (SAFER) COMMUNICATIONS

One of the most exciting avenues that researchers, armed with qubits, are exploring, is security.

When it comes to classical communications, most data is secured by distributing a shared key to the sender and receiver, and then using this common key to encrypt the message. The receiver can then use their key to decode the data at their end.

The security of most classical communication today is based on an algorithm for creating keys that is difficult for hackers to break, but not impossible. That's why researchers are looking at making this communication process "quantum". The concept is at the core of an emerging field of cybersecurity called quantum key distribution (QKD).

QKD works by having one of the two parties encrypt a piece of classical data by encoding the cryptography key onto qubits. The sender then transmits those qubits to the other person, who measures the qubits in order to obtain the key values.

SEE: The UK is building its first commercial quantum computer

Measuring causes the state of the qubit to collapse; but it is the value that is read out during the measurement process that is important. The qubit, in a way, is only there to transport the key value.

More importantly, QKD means that it is easy to find out whether a third party has eavesdropped on the qubits during the transmission, since the intruder would have caused the key to collapse simply by looking at it.

If a hacker looked at the qubits at any point while they were being sent, this would automatically change the state of the qubits. A spy would inevitably leave behind a sign of eavesdropping which is why cryptographers maintain that QKD is "provably" secure.

SO, WHY A QUANTUM INTERNET?

QKD technology is in its very early stages. The "usual" way to create QKD at the moment consists of sending qubits in a one-directional way to the receiver, through optic-fibre cables; but those significantly limit the effectiveness of the protocol.

Qubits can easily get lost or scattered in a fibre-optic cable, which means that quantum signals are very much error-prone, and struggle to travel long distances. Current experiments, in fact, are limited to a range of hundreds of kilometers.

There is another solution, and it is the one that underpins the quantum internet: to leverage another property of quantum, called entanglement, to communicate between two devices.

When two qubits interact and become entangled, they share particular properties that depend on each other. While the qubits are in an entangled state, any change to one particle in the pair will result in changes to the other, even if they are physically separated.The state of the first qubit, therefore, can be "read" by looking at the behavior of its entangled counterpart. That's right: even Albert Einstein called the whole thing "spooky action at a distance".

And in the context of quantum communication, entanglement could in effect, teleport some information from one qubit to its entangled other half, without the need for a physical channel bridging the two during the transmission.

HOW DOES ENTANGLEMENT WORK?

The very concept of teleportation entails, by definition, the lack of a physical network bridging between communicating devices. But it remains that entanglement needs to be created in the first place, and then maintained.

To carry out QKD using entanglement, it is necessary to build the appropriate infrastructure to first create pairs of entangled qubits, and then distribute them between a sender and a receiver. This creates the "teleportation" channel over which cryptography keys can be exchanged.

Specifically, once the entangled qubits have been generated, you have to send one half of the pair to the receiver of the key. An entangled qubit can travel through networks of optical fibre, for example; but those are unable to maintain entanglement after about 60 miles.

Qubits can also be kept entangled over large distances via satellite, but covering the planet with outer-space quantum devices is expensive.

There are still huge engineering challenges, therefore, to building large-scale "teleportation networks" that could effectively link up qubits across the world. Once the entanglement network is in place, the magic can start: linked qubits won't need to run through any form of physical infrastructure anymore to deliver their message.

During transmission, therefore, the quantum key would virtually be invisible to third parties, impossible to intercept, and reliably "teleported" from one endpoint to the next. The idea will resonate well with industries that deal with sensitive data, such as banking, health services or aircraft communications. And it is likely that governments sitting on top secret information will also be early adopters of the technology.

WHAT ELSE COULD WE DO WITH THE QUANTUM INTERNET?

'Why bother with entanglement?' you may ask. After all, researchers could simply find ways to improve the "usual" form of QKD. Quantum repeaters, for example, could go a long way in increasing communication distance in fibre-optic cables, without having to go so far as to entangle qubits.

That is without accounting for the immense potential that entanglement could have for other applications. QKD is the most frequently discussed example of what the quantum internet could achieve, because it is the most accessible application of the technology. But security is far from being the only field that is causing excitement among researchers.

The entanglement network used for QKD could also be used, for example, to provide a reliable way to build up quantum clusters made of entangled qubits located in different quantum devices.

Researchers won't need a particularly powerful piece of quantum hardware to connect to the quantum internet in fact, even a single-qubit processor could do the job. But by linking together quantum devices that, as they stand, have limited capabilities, scientists expect that they could create a quantum supercomputer to surpass them all.

SEE: Guide to Becoming a Digital Transformation Champion (TechRepublic Premium)

By connecting many smaller quantum devices together, therefore, the quantum internet could start solving the problems that are currently impossible to achieve in a single quantum computer. This includes expediting the exchange of vast amounts of data, and carrying out large-scale sensing experiments in astronomy, materials discovery and life sciences.

For this reason, scientists are convinced that we could reap the benefits of the quantum internet before tech giants such as Google and IBM even achieve quantum supremacy the moment when a single quantum computer will solve a problem that is intractable for a classical computer.

Google and IBM's most advanced quantum computers currently sit around 50 qubits, which, on its own, is much less than is needed to carry out the phenomenal calculations needed to solve the problems that quantum research hopes to address.

On the other hand, linking such devices together via quantum entanglement could result in clusters worth several thousands of qubits. For many scientists, creating such computing strength is in fact the ultimate goal of the quantum internet project.

WHAT COULDN'T WE DO WITH THE QUANTUM INTERNET?

For the foreseeable future, the quantum internet could not be used to exchange data in the way that we currently do on our laptops.

Imagining a generalized, mainstream quantum internet would require anticipating a few decades (or more) of technological advancements. As much as scientists dream of the future of the quantum internet, therefore, it is impossible to draw parallels between the project as it currently stands, and the way we browse the web every day.

A lot of quantum communication research today is dedicated to finding out how to best encode, compress and transmit information thanks to quantum states. Quantum states, of course, are known for their extraordinary densities, and scientists are confident that one node could teleport a great deal of data.

But the type of information that scientists are looking at sending over the quantum internet has little to do with opening up an inbox and scrolling through emails. And in fact, replacing the classical internet is not what the technology has set out to do.

Rather, researchers are hoping that the quantum internet will sit next to the classical internet, and would be used for more specialized applications. The quantum internet will perform tasks that can be done faster on a quantum computer than on classical computers, or which are too difficult to perform even on the best supercomputers that exist today.

SO, WHAT ARE WE WAITING FOR?

Scientists already know how to create entanglement between qubits, and they have even been successfully leveraging entanglement for QKD.

China, a long-time investor in quantum networks, has broken records on satellite-induced entanglement. Chinese scientists recently established entanglement and achieved QKD over a record-breaking 745 miles.

The next stage, however, is scaling up the infrastructure. All experiments so far have only connected two end-points. Now that point-to-point communication has been achieved, scientists are working on creating a network in which multiple senders and multiple receivers could exchange over the quantum internet on a global scale.

The idea, essentially, is to find the best ways to churn out lots of entangled qubits on demand, over long distances, and between many different points at the same time. This is much easier said than done: for example, maintaining the entanglement between a device in China and one in the US would probably require an intermediate node, on top of new routing protocols.

And countries are opting for different technologies when it comes to establishing entanglement in the first place. While China is picking satellite technology, optical fibre is the method favored by the US DoE, which is now trying to create a network of quantum repeaters that can augment the distance that separates entangled qubits.

In the US, particles have remained entangled through optical fibre over a 52-mile "quantum loop" in the suburbs of Chicago, without the need for quantum repeaters. The network will soon be connected to one of the DoE's laboratories to establish an 80-mile quantum testbed.

In the EU, the Quantum Internet Alliance was formed in 2018 to develop a strategy for a quantum internet, and demonstrated entanglement over 31 miles last year.

For quantum researchers, the goal is to scale the networks up to a national level first, and one day even internationally. The vast majority of scientists agree that this is unlikely to happen before a couple of decades. The quantum internet is without doubt a very long-term project, with many technical obstacles still standing in the way. But the unexpected outcomes that the technology will inevitably bring about on the way will make for an invaluable scientific journey, complete with a plethora of outlandish quantum applications that, for now, cannot even be predicted.

Originally posted here:
What is the quantum internet? Everything you need to know about the weird future of quantum networks - ZDNet

Quantum Cryptography Market 2020 Growing Demand, Top Companies, Innovative Technologies, Segmental Outlook and Industry Insights 2026 – Scientect

Global Quantum Cryptography Market Analysis with forecast period 2020 to 2025 provides an in-depth analysis of market growth factors, future assessment, country-level analysis, Quantum Cryptography industry distribution, and competitive landscape analysis of major industry players. The research report of global Quantum Cryptography market report offers the extensive information about the top most makers and sellers who are doing great and are directly working right in the market now and which have great market area according to the country and region and other aspects that affect the growth of any company or industry. The report exhibits both Quantum Cryptography market quantitative as well as qualitative data with tables and figures displayed in the form of bar graphs, and pie charts.

This report focuses on the Global Quantum Cryptography Market trends, future forecasts, growth opportunities, key end-user industries and market players. The objectives of the study are to present the key developments of the market across the globe.

Get sample copy of Quantum Cryptography Market report @ https://www.adroitmarketresearch.com/contacts/request-sample/958

It provides a knowledge regarding Porters Five Forces including substitutes, potential entrants, buyers, industry competitors, and suppliers with genuine information for understanding the global Quantum Cryptography market. Furthermore, it offers detailed data of vendors including the profile, specifications of product, sales, applications, annual performance in the industry, investments, acquisitions and mergers, market size, revenue, market share, and more. The Quantum Cryptography market report delivers an in-depth study of market size, country-level market size, region, segmentation market growth, market share, sales analysis, value chain optimization, market players, the competitive landscape, recent developments, strategic market growth analysis, trade regulations, opportunities analysis, product launches, technological innovations, and area marketplace expanding. The Quantum Cryptography market reports delivers the knowledge about market competition between vendors through regional segmentation of markets in terms of revenue generation potential, business opportunities, demand & supply over the forecasted period.

Top Leading Key Players are:

ID Quantique, MagiQ Technologies, Infineon Technologies, QuintenssenceLabs, Crypta Labs, ISARA, Toshiba, Microsoft, IBM, HP, PQ Solutions, and Qubitekk.

Browse the complete report @ https://www.adroitmarketresearch.com/industry-reports/quantum-cryptography-market

The report entitled Quantum Cryptography market also gives a detailed idea of various technologies used by the manufacturers and industry experts to enhance the technological intervention in this market. An in-depth study in terms of production, market revenue share and price is also a major factor of focus in this report. The company profile section also focusses on companies planning expansions. This can be very well studies through regional segmentation as all the key market players play an important role in uplifting the region they operate in. Furthermore, the report also gives the factors that might hamper the market growth over the forecast period. The detailed report on Quantum Cryptography market gives its readers a summary of the market movements and helps them to analyze all the other factors that can affect the market.

Based on application, the market has been segmented into:

NA

The Quantum Cryptography market report supplies business outlining, requirements, contact information and product image of important manufacturers of Quantum Cryptography market. This analysis report similarly reduces the present, past and in future market business strategies, company extent, development, share and estimate analysis having a place with the predicted circumstances. Moreover, the possible results and the exposure to the enhancement of Quantum Cryptography market widely covered in this report. In addition to this, the Quantum Cryptography market report provides inclusive analysis of the SWOT and PEST tools for all the major regions such as North America, Europe, Asia Pacific, and the Middle East and Africa. The report offers regional expansion of the industry with their product analysis, market share, and brand specifications.

For Any Query on the Quantum Cryptography Market: https://www.adroitmarketresearch.com/contacts/enquiry-before-buying/958

About Us :

Adroit Market Research is an India-based business analytics and consulting company. Our target audience is a wide range of corporations, manufacturing companies, product/technology development institutions and industry associations that require understanding of a markets size, key trends, participants and future outlook of an industry. We intend to become our clients knowledge partner and provide them with valuable market insights to help create opportunities that increase their revenues. We follow a code Explore, Learn and Transform. At our core, we are curious people who love to identify and understand industry patterns, create an insightful study around our findings and churn out money-making roadmaps.

Contact Us :

Ryan JohnsonAccount Manager Global3131 McKinney Ave Ste 600, Dallas,TX 75204, U.S.APhone No.: USA: +1 972-362 -8199 / +91 9665341414

See the original post:
Quantum Cryptography Market 2020 Growing Demand, Top Companies, Innovative Technologies, Segmental Outlook and Industry Insights 2026 - Scientect

Global Quantum Cryptography Market Trends By Types And Application, Forecast Analysis To 2026 – The Daily Chronicle

An international Quantum Cryptography Market research report delivers wide-ranging analysis of the market structure along with forecast of the diverse segments and sub-segments of the market. The report is generated based on the market type, size of the organization, availability on-premises, the end-users organization type, and the availability in areas such as North America, South America, Europe, Asia-Pacific and Middle East & Africa. The Quantum Cryptography business report also puts light on the various inhibitors as well as motivators of the product market in both quantitative and qualitative manner so that users get precise information.

The Quantum Cryptography business report offers sustainable forward looking growth programs, to ensure business success which is imperative for organizations. The report contains historic data, present market trends, environment, technological innovation, upcoming technologies and the technical progress in the related industry. This market research report is a complete overview of the market, covering various aspects like product definition, segmentation based on various parameters, and the prevailing vendor landscape. This Quantum Cryptography Market study also analyzes the market status, market share, growth rate, future trends, market drivers, opportunities and challenges, risks and entry barriers, sales channels, distributors and Porters Five Forces Analysis.

Click Here to Get Free Sample Report Of Quantum Cryptography Market @https://www.databridgemarketresearch.com/request-a-sample/?dbmr=global-quantum-cryptography-market

Global Quantum Cryptography Market report offers a complete analysis of the market. It will thus via in-depth qualitative insights, historical data, and verifiable projections about market size. The projections featured within the report are derived persecution well-tried analysis methodologies and assumptions. By doing thus, the analysis report is a repository of research and data for each side of the Quantum Cryptography Market, as well as however not restricted to: Regional markets, outstanding Manufactures, technology, types, and applications.

Prominent Key Players Covered in the report:

QuintessenceLabs, NuCrypt, Anhui Qasky Quantum Technology Co. Ltd., PQ Solutions Limited, MagiQ Technologies, ISARA Corporation, Quantum XC., Aurea Technologies Inc, IBM Corporation, Infineon Technologies AG and Mitsubishi Electric Corporation..

Major Regions as Follows:

A complete value chain of the Global Quantum Cryptography Market is presented in the research report. It is associated with the review of the downstream and upstream components of the Quantum Cryptography Market. The market is bifurcated on the basis of the categories of products and customer application segments. The market analysis demonstrates the expansion of each segment of the Global Quantum Cryptography Market. The research report assists the user in taking a decisive step that will be a milestone in developing and expanding their businesses in the Global Quantum Cryptography Market.

Get Complete Details with TOC For Free @https://www.databridgemarketresearch.com/toc/?dbmr=global-quantum-cryptography-market

How Does This Market Insights Help?

Key Pointers Covered in the Quantum Cryptography Market:

Read Report Overview @https://www.databridgemarketresearch.com/reports/global-quantum-cryptography-market

TABLE OF CONTENTS

Part 01: Executive Summary

Part 02: Scope of the Report

Part 03: Research Methodology

Part 04: Market Landscape

Part 05: Pipeline Analysis

Pipeline Analysis

Part 06: Market Sizing

Market Definition

Market Sizing

Market Size And Forecast

Part 07: Five Forces Analysis

Bargaining Power Of Buyers

Bargaining Power Of Suppliers

Threat Of New Entrants

Threat Of Substitutes

Threat Of Rivalry

Market Condition

Part 08: Market Segmentation

Segmentation

Comparison

Market Opportunity

Part 09: Customer Landscape

Part 10: Regional Landscape

Part 11: Decision Framework

Part 12: Drivers and Challenges

Market Drivers

Market Challenges

Part 13: Market Trends

Part 14: Vendor Landscape

Part 15: Vendor Analysis

Vendors Covered

Vendor Classification

Market Positioning Of Vendors

Part 16: Appendix

In conclusion, the Quantum Cryptography Market report is a reliable source for accessing the research data that is projected to exponentially accelerate your business. The report provides information such as economic scenarios, benefits, limits, trends, market growth rates, and figures. SWOT analysis is also incorporated in the report along with speculation attainability investigation and venture return investigation.

Inquire for further detailed information of Global Quantum Cryptography Market Report @ https://www.databridgemarketresearch.com/inquire-before-buying/?dbmr=global-quantum-cryptography-market

Key Questions Answered:

Customization of the Report:

Data Bridge Market Research also provides customization options to tailor the reports as per client requirements. This report can be personalized to cater to your research needs. Feel free to get in touch with our sales team, who will ensure that you get a report as per your needs.

Thanks for reading this article you can also get individual chapter wise section or region wise report version like North America, Europe, MEA or Asia Pacific.

About Data Bridge Market Research:

An absolute way to forecast what future holds is to comprehend the trend today!

Data Bridge Market Research set forth itself as an unconventional and neoteric Market research and consulting firm with unparalleled level of resilience and integrated approaches. We are determined to unearth the best market opportunities and foster efficient information for your business to thrive in the market. Data Bridge endeavors to provide appropriate solutions to the complex business challenges and initiates an effortless decision-making process. Data bridge is an aftermath of sheer wisdom and experience which was formulated and framed in the year 2015 in Pune.

Data Bridge Market Research

US: +1 888 387 2818

UK: +44 208 089 1725

Hong Kong: +852 8192 7475

[emailprotected]

Originally posted here:
Global Quantum Cryptography Market Trends By Types And Application, Forecast Analysis To 2026 - The Daily Chronicle

WWE releases statement on the new third party ban; Superstars react – Wrestling-Edge.com

WWE Chairman Vince McMahon issued a statement on Friday banning Superstars from engaging with third party platforms such as Twitch and Cameo.

McMahon sent out a letter to the talents which stated that all such activities were to be terminated within the next 30 days, by October 2. Failing to do so would lead to fines, suspension, or even termination of contract at WWEs discretion, the notice stated.

The reason behind the edict was to promote and protect the WWE brand in every conceivable way, the letter said. According to PWInsider, WWE has now released a statement regarding the matter.

Much like Disney and Warner Bros., WWE creates, promotes and invests in its intellectual property, i.e. the stage names of performers like The Fiend Bray Wyatt, Roman Reigns, Big E and Braun Strowman. It is the control and exploitation of these characters that allows WWE to drive revenue, which in turn enables the company to compensate performers at the highest levels in the sports entertainment industry. Notwithstanding the contractual language, it is imperative for the success of our company to protect our greatest assets and establish partnerships with third parties on a company-wide basis, rather than at the individual level, which as a result will provide more value for all involved.

It was reported that the decision was not taken very well by the WWE Superstars. Several of them used third-party platforms for fan interactions as well as extra income, especially during the pandemic. AJ Styles is quite active on his Twitch stream. Alexa Bliss and Roman Reigns recently opened their Cameo accounts as well.

Former WWE Superstars have also spoke up against it, including Batista. He infamously quit WWE over refusal to let him participate in opportunities outside the company.

#NoComment but I am retweeting!!!! #RealTalk https://t.co/eP6tgD2C4S

Shadow Person Dave Bautista (@DaveBautista) September 5, 2020

Banning wrestlers from making extra money on third party deals twitch, YouTube, cameo strikes me as a crummy thing to do.

Just my opinion.

Mick Foley (@RealMickFoley) September 5, 2020

Alright guys. Girls. Are they gonna fireEveryone? Just keep doing you. DontWorry.

player/coach (@CMPunk) September 5, 2020

Sooooooo guess now would be a good time to launch my Twitch and Cameo??

Renee Paquette (@ReneePaquette) September 4, 2020

View post:

WWE releases statement on the new third party ban; Superstars react - Wrestling-Edge.com

Homomorphic encryption: Deriving analytics and insights from encrypted data – CSO Online

What do you do when you need to perform computations on large data sets while preserving their confidentiality? In other words, you would like to gather analytics, for example, on user data, without revealing the contents to the computation engine that is going to calculate the analytics. Or you are a cloud services provider supporting encrypted storage of documents but want to enable your users to edit their documents without decrypting them first.

This is where homomorphic encryption could come to your rescue. Homomorphic encryption provides the ability to outsource the storage and computation of data to cloud environments by converting the data into an encrypted form first.

Whats noteworthy about this technique is you achieve the same results (in encrypted form) by performing the desired operations and computations on the encrypted data as you would have by performing the same operations on its unencrypted form.

Homomorphic encryption differs from typical encryption methods in that it allows computation to be performed directly on encrypted data without requiring access to a secret key. The result of such a computation remains in encrypted form, and can at a later point be revealed by the owner of the secret key, according to Homomorphic Encryption Standardization, the industry standards consortium that maintains the official standards, guidance and information on developments in the area. This allows the use of the same computational analysis solutions without compromising the confidentiality of the data at any stage.

Read more:
Homomorphic encryption: Deriving analytics and insights from encrypted data - CSO Online

How to enable end-to-end encryption for the Nextcloud app – TechRepublic

Learn how you can enable the new Nextcloud end-to-end encryption.

Image: Jack Wallen

The developers of the Nextcloud open source on-premise cloud solution have created a really amazing encryption setup between the latest desktop client (version 3.x) and the newest release of their server solution (version 19).

This end-to-end encryption method makes it such that encrypted files are only available to the Nextcloud desktop, and mobile applications and are not accessible via the server. In other words, you encrypt a file that exists on the server from the client app. Once you've encrypted the file, it will no longer be accessible on the server, but it will remain available (all the while encrypted) on any client application you have connected to your account on the server.

The thing about the new end-to-end encryption is that the setup isn't quite intuitive. After some stumbling around, I did manage to put the pieces together, so I can show you how it's done.

The first thing you must do is enable encryption on your Nextcloud instance. To do that, log in to Nextcloud with an admin account and then click your profile icon at the top-right of the window. From the popup menu, click Settings. In the resulting window, click Security from the menu in the left sidebar.

From the Security Settings window, click the checkbox for Enable Server-Side Encryption (Figure A).

Figure A

Enabling server-side encryption in Nextcloud 19.

The next step is to install the end-to-end encryption app. To do that, click the profile icon again and click Apps. In the Apps window, type encryption in the search bar. When the End-to-End Encryption entry appears (Figure B), click Download And Enable.

Figure B

Installing the End-to-End Encryption app in Nextcloud 19.

Next, you need to enable a default encryption module. To do that, go back to Apps and search for encryption a second time. You should see an entry for Default Encryption Module. Click Enable to enable this module.

Okay, this is the tricky part, because it depends on a number of things. First, is this installation WAN- or LAN-facing? Second, do you need true HTTPS, or do you just need to be able to point a browser to a secure HTTP address. For example, in my LAN-facing, non-domain using instance, I don't need to work with an SSL certificate, I only need the client to think it's using HTTPS. If you're accessing your Nextcloud instance via IP address, and don't have a domain for the cloud server, you'll want to use the same method I use.

If, on the other hand, you do use a domain for your Nextcloud instance, and your server is accessible via both WAN and LAN, you'll need to go the full-on, certificate-enabled HTTPS route.

I'm going to show you how to use the "tricky" method, just to get you up and running with end-to-end encryption. If you need to go the true HTTPS route, make sure you have your certificate and that your Apache or NGINX configuration file points to the proper keys.

Otherwise, log in to your Nextcloud server, via SSH, and issue the following commands:

At this point, you should be able to access your Nextcloud instance using https.

Open your Nextcloud client on your desktop. You should now see a new button labeled Enable Encryption (Figure C).

Figure C

Enabling encryption on the Nextcloud client.

Click that button and encryption will then be enabled between the client and the server.

With everything in place, you can now encrypt a folder from within the Nextcloud app by right-clicking a folder and select Encrypt (Figure D).

Figure D

Encrypting a folder in Nextcloud from the client.

At this point, the folder will appear in the Nextcloud web interface with a lock. You can see the folder, but you don't have permission to upload or create files in that encrypted directory. The only way you can do that is via the desktop or mobile app. If you navigate into that folder, the file will be listed as a random string of characters (Figure E).

Figure E

An encrypted file that is no longer accessible from within the server.

Congratulations, you now have end-to-end file encryption enabled between your Nextcloud 19 server and the desktop/mobile application.

You don't want to miss our tips, tutorials, and commentary on the Linux OS and open source applications. Delivered Tuesdays

Read more from the original source:
How to enable end-to-end encryption for the Nextcloud app - TechRepublic

Encryption Software Market: Regional Overview and Trends Evaluation to 2026 – Fractovia News

Latin America encryption software market is expected to grow at a CAGR of over 18% from 2020 to 2026 due to the rising number of cyberattacks on the business-critical infrastructure, growing usage of digital platforms among enterprises to conduct business transactions, and supportive government initiatives to promote cybersecurity. For instance, since December 2019, the Mexican institutions including Mexico Central Bank, the National Defense Ministry (Sedena), Mexico Supreme Court, and the House of Representatives recorded more than 45 million attempted attacks to access databases and steal information. The rapidly evolving threat landscape has compelled public & private enterprises to promote digital security to safeguard sensitive business information. The government agencies in the countries including Mexico, Brazil, and Argentina are introducing cybersecurity strategies to respond to a wide array of cyberattacks.

The email encryption software market is expected to hold a share of over 25% in 2026 due to the rising uptake of security software to protect data from malware, identity thefts, and phishing. As email is one of the widely used communication methods used by enterprises, the demand for email data protection software to secure various aspects of email systems including content, media attachments or email access increases. The software encrypts data in transit and at rest and also supports multi-factor authentication for additional security, ensuring that sensitive information is always protected in line with regulatory compliance.

Get sample copy of this research report @ https://www.gminsights.com/request-sample/detail/4484

The on-premise deployment model segment held over 70% of the encryption software market share in 2019 and is projected to maintain a dominant position over the forecast timeline. The enterprises prefer an on-premise deployment model approach due to the high security associated with managing sensitive data in-house and gain access to cryptography keys for enhanced security. However, with the growing popularity of cloud platforms to store enterprise data due to high scalability and cost benefits, the demand for cloud-based encryption software is expected to accelerate over the forecast timeline.

Proliferating demand for comprehensive security software solutions that can effectively safeguard users data from identity thefts, phishing and malware could drive the email encryption software market expansion. Analysts predict that the segment might own more than 25% of the overall encryption software market share by 2026.

Email is often considered as a universal mean of communication and is commonly used in big and small enterprises. In a move to prevent unauthorized access to email or data, several companies are preferring installation of strong email data protection software. These solutions encrypt data in transit as well as run multi-factor authentication for extra security.

In terms of application, the retail sector is anticipated to endow considerable growth opportunities to the encryption software market. Factors such as the growing need to safeguard consumer data throughout a retail business could play a vital role in complementing product demand.

Request for customization @ https://www.gminsights.com/roc/4484

The competition in the encryption software market is characterized by strategic partnerships, new product launches, and geographic expansion. For instance, in November 2019, Sophos partnered with Telefonica UK (O2) to provide its products & services to Telefonica's customers in the UK. The partnership enables the customers to gain access to Sophos Central cloud-based security platform to secure their organizations.

Table of Contents (ToC) of the report:

Chapter 1. Methodology & Scope

1.1. Methodology

1.1.1. Initial data exploration

1.1.2. Statistical model and forecast

1.1.3. Industry insights and validation

1.1.4. Scope

1.1.5. Definitions

1.1.6. Methodology & forecast parameters

1.2. Data Sources

1.2.1. Secondary

1.2.1.1. Paid sources

1.2.1.2. Public sources

1.2.2. Primary

Chapter 2. Executive Summary

2.1. Encryption software industry 360 synopsis, 2015 2026

2.2. Business trends

2.3. Regional trends

2.4. Component trends

2.4.1. Software trends

2.4.2. Service trends

2.5. Deployment model trends

2.6. Application trends

Chapter 3. Encryption Software Market Insights

3.1. Introduction

3.2. Industry segmentation

3.3. Industry landscape, 2015 2026

3.4. Evolution of encryption software

3.5. Encryption software industry architecture

3.6. Encryption software industry ecosystem analysis

3.7. Technology & innovation landscape

3.7.1. Quantum cryptography

3.7.2. Honey encryption

3.7.3. Lattice based cryptography

3.8. Regulatory landscape

3.8.1. North America

3.8.1.1. ENCRYPT Act of 2019 (U.S.)

3.8.1.2. Gramm-Leach-Bliley Act of 1999 (U.S.)

3.8.1.3. Personal Information Protection and Electronic Documents Act [(PIPEDA) Canada]

3.8.2. Europe

3.8.2.1. General Data Protection Regulation (EU)

3.8.2.2. Data Protection Authority (DPA) regulations on the transmission of personal data by e-mail (Denmark)

3.8.3. APAC

3.8.3.1. National Law on Cryptography (China)

3.8.3.2. Guide to securing personal data in electronic medium (Singapore)

3.8.4. Latin America

3.8.4.1. Law No. 9,296 of July 24, 1996 (Government Access to Encrypted Communications, Brazil)

3.8.4.2. National Directorate of Personal Data Protection (Argentina)

3.8.5. MEA

3.8.5.1. Policy of Control and Licensing of Commercial Encryption Items (Israel)

3.8.5.2. Regulation of Interception of Communications and Provision of Communication-related Information Act, 2002 (RICA- South Africa)

3.9. Industry impact forces

3.9.1. Growth drivers

3.9.1.1. Stringent regulations on cybersecurity and data privacy compliances

3.9.1.2. Rising concerns over securing enterprise Intellectual Property (IP) assets

3.9.1.3. Increasing proliferation of cloud and virtualization technologies

3.9.1.4. Growing trend of Bring Your Own Devices (BYOD) among enterprises

3.9.2. Industry pitfalls & challenges

3.9.2.1. Complexities in encryption key management

3.9.2.2. Easy availability of pirated and free-to-use encryption software

3.9.2.3. Regulatory restrictions on cryptography and encryption

3.10. Growth potential analysis

3.11. Porters analysis

3.12. PESTEL analysis

Browse complete Table of Contents (ToC) of this research report @ https://www.gminsights.com/toc/detail/encryption-software-market

See the rest here:
Encryption Software Market: Regional Overview and Trends Evaluation to 2026 - Fractovia News

COVID-19 Impact on Global Encryption Software Market Report to Share Key Aspects of the Industry with the details of Influence Factors – Scientect

Introduction & Scope: Global Encryption Software Market

Global Encryption Software market research report presentation demonstrates and presents an easily understandable market depiction, lending crucial insights on market size, market share as well as latest market developments and notable trends that collectively harness growth in the global Encryption Software market. Research analysts and industry experts through this report are also aiming to lend ample light on further essential determinants such as a meticulous review and analytical take of opportunity assessment, also encompassing threat and challenge analysis that constantly deter upward growth spurt in Encryption Software market.

Leading Companies Reviewed in the Report are:

IBM (US), Microsoft (US), Symantec (US), Thales e-Security (France), Trend Micro (Japan), Sophos (UK), Check Point (Israel), Micro Focus (UK), McAfee (US), Dell (US), WinMagic (US), ESET (US), Cryptomathic (Denmark), Bitdefender (Romania), Stormshield (France), and CipherCloud (US).

Get Exclusive Sample of Report on Encryption Software market is available @ https://www.adroitmarketresearch.com/contacts/request-sample/1055

Gauging COVID-19 Impact

To enable mindful business discretion amidst catastrophic developments such as COVID-19 and its subsequent implications, this ready-to-refer research report on the global Encryption Software market is designed to answer the queries pertaining to the pandemic to emerge from catastrophic implications.

This intensively compiled research report presentation is a versatile hub of innate knowledge factors such as sales volume and bulk production, pricing matrix and sales figures, overall growth review and margin, chances of growth in the future and their range amongst other additional growth determinants that influence growth in the Encryption Software market.

Regional Analysis

Furthermore, the report helps as a expedient guide to design and instrument probable growth routing activities across select regional hubs in the Encryption Software market. Frontline companies and their result-based growth approaches are also recruited in the report to emulate growth.

In addition to in its succeeding sectors of the report, this detailed presentation of the Encryption Software market offers vigorous details on regional belts and expansion projects identifying potential growth possibilities.

Quick Read Table of Contents of this Report @ https://www.adroitmarketresearch.com/industry-reports/encryption-software-market

Based on application, the Market has been segmented into:

NA

According to research inputs, this global Encryption Software market is also likely to register a thumping growth of USD xx million in 2020 and is further anticipated to reach over xx million USD by the end of 2027, clocking at a steady CAGR of xx% through the forecast span, 2020-27. Expert opinion also suggests that the global Encryption Software market is likely to tread on the road to recovery in the foreseeable future.

Five-Pointer Guide for Report Investment

*A rigorous, end-to-end review and analysis of the Encryption Software market events and their implications

*A thorough compilation of broad market segments

*A complete demonstration of best in-industry practices, mindful business decisions and manufacturer activities that steer revenue sustainability in the global Encryption Software market

*A complete assessment of competition spectrum, inclusive of relevant details about key and emerging players

*A pin-point review of the major dynamics and dominant alterations that influence growth in the global Encryption Software market

Do You Have Any Query Or Specific Requirement? Ask to Our Industry [emailprotected] https://www.adroitmarketresearch.com/contacts/enquiry-before-buying/1055

About Us :

Adroit Market Research is an India-based business analytics and consulting company incorporated in 2018. Our target audience is a wide range of corporations, manufacturing companies, product/technology development institutions and industry associations that require understanding of a Markets size, key trends, participants and future outlook of an industry. We intend to become our clients knowledge partner and provide them with valuable Market insights to help create opportunities that increase their revenues. We follow a code- Explore, Learn and Transform. At our core, we are curious people who love to identify and understand industry patterns, create an insightful study around our findings and churn out money-making roadmaps.

Contact Us :

Ryan JohnsonAccount Manager Global3131 McKinney Ave Ste 600, Dallas,TX75204, U.S.A.Phone No.: USA: +1 972-362 -8199/ +91 9665341414

View original post here:
COVID-19 Impact on Global Encryption Software Market Report to Share Key Aspects of the Industry with the details of Influence Factors - Scientect

17% CAGR | Covid-19 Positive Impact on Encryption Software Market 2020-2027 |Gemalto (Amsterdam,Netherlands), Symantec (California,US), Dell…

The global Encryption Software market size is expected to grow from USD 9.8 billion in 2020 to USD 25 billion by 2027, at a Compound Annual Growth Rate (CAGR) of 17% from 2020 to 2027 in the post-COVID-19 scenario.

The Research Report Global Encryption Software Market Global Demand Analysis & Opportunity Outlook 2027 to its collection of industry research reports. This is an on-going research which will include all the recent information in the overall market. The market study will include market size and forecast from 2020 to 2027, different market segments, analysis by region, country and a section on key players identified across the value chain in the market.

The scope of the Encryption Software Market report is as follows the report provides information on growth segments and opportunities for investment and Benchmark performance against key competitors. Geographically, the global market has been segmented into four regions such as North America, Europe, Asia Pacific and the rest of the world.

Get a PDF Sample of Encryption Software Market Research Report at:https://www.itintelligencemarkets.com/request_sample.php?id=571

Top Profiled Key players: Gemalto (Amsterdam,Netherlands), Symantec (California,US), Dell (Texas,US), Sophos (Abingdon,UK), McAfee (California,US), Trend Micro (Tokyo,Japan), IBM (New York,US), Microsoft (Washington,US), PKWARE (Wisconsin,US), Cipher Cloud (California,US), ESET (Bratislava,Slovakia)

The report also delivers a detailed segment-based assessment of the Global Encryption Software market. The segments together with their sub-segments have been analysed in this report. Furthermore, the report evaluates the trends that will help to fuel the growth of the individual sectors.

In conclusion, Encryption Software Market report presents the descriptive analysis of the parent market supported elite players, present, past and artistic movement knowledge which is able to function a profitable guide for all the Encryption Software trade competitors. The report contains a comprehensive marketing research and vendor landscape additionally to a SWOT analysis of the key vendors.

Get Discount on Encryption Software Market Research Report at:https://www.itintelligencemarkets.com/ask_for_discount.php?id=571

Table of Content:

Chapter 1 Encryption Software Market OverviewChapter 2 Global Economic Impact on Encryption Software Market IndustryChapter 3 Global Encryption Software Market Competition by ManufacturersChapter 4 Global Encryption Software Production, Revenue (Value) by Region (2020-2027)Chapter 5 Global Encryption Software Supply (Production), Consumption, Export, Import by Regions (2020-2027)Chapter 6 Global Encryption Software Production, Revenue (Value), Price Trend by TypeChapter 7 Global Encryption Software Market Analysis by ApplicationChapter 8 Encryption Software Manufacturing Cost AnalysisChapter 9 Industrial Chain, Sourcing Strategy and Downstream Buyers

Chapter 10 Marketing Strategy Analysis, Distributors/Traders

Get More Information of Encryption Software Market Research Report at:https://www.itintelligencemarkets.com/enquiry_before_buying.php?id=571

Contact us:Erika Thomas76 AT US 19 & HWY129 Murphy Highway,Blairsville, GA, USAEmail:[emailprotected]Phone:+1 888-312-3102About Us:

At IT Intelligence Markets, we model all our work on our core philosophy that believes in customer satisfaction. We serve a global clientele by supplying market intelligence research reports after conducting exhaustive research. Our reports are replete with productive insights & recent market dynamics as the healthcare industry is constantly undergoing changes like ever-changing consumer preferences, supply channels and latest technologies. Our market research analysts not only investigate the market for drivers, restraints & challenges but also gauge the overall progress of the market by comparing chief market players. Our report forms a crucial piece of intelligence using which our clients can unleash their potential & tap their capacity to harness the correct technologies & surpass their competitors.

See the original post:
17% CAGR | Covid-19 Positive Impact on Encryption Software Market 2020-2027 |Gemalto (Amsterdam,Netherlands), Symantec (California,US), Dell...