Carnegie Mellon University Students Create New Cryptocurrency, dubbed AndyCoin – CMU The Tartan Online

Note from the editor: We here at The Tartan take our journalism very seriously. As such, we would like to sincerely apologize for an inaccurate assertion we made in our last issue of Pillbox. In our reporting on the multi-enfabulator, we erroneously claimed that the panametric fan consisted of hydrocoptic marzelvanes. The enfabulator project team asked us to clarify that vanes are an obsolete technology; the new panametric assembly actually uses a marzel-type fitting with a low slip coefficient to house a reductive chafe-membrane. We deeply apologize for any confusion this has caused. The junior staff writer responsible for the mistake has been locked in the Wasp Room until further notice.

Last week the CMU Crypto Cats, a cryptocurrency-based student organization, made an announcement saying they had finalized development on an original cryptocurrency that they call AndyCoin.

The most novel aspect of this currency is the design of its "blockchain." For those unfamiliar, blockchains (also known as "Distributed Ledger Technology") are the means by which a cryptocurrency operates. Simply put, they are a ledger of every transaction that occurs with the associated cryptocurrency. The blockchain gets stored on hundreds, if not thousands of different computers, meaning that the official tally of who has how many coins is distributed among many different people this is how they keep the record decentralized. Anytime somebody wishes to transfer cryptocurrency, their request must be approved by every computer on the network before a new transaction is appended to the end of the blockchain. As long as all the versions of the blockchain agree, people can freely trade crypto without the need for a central authority.

In their announcement, the Crypto Cats explain their work. "With data obfuscation, procedural obtuseness, and consumer-end price volatility as our primary goal, work has been proceeding on developing a novel blockchain protocol that would maximize speculative financial contributions while also inflating the apparent individual commodity value. The value of AndyCoin in conventional fiat currency is realized through an innovative process that converts asset bundles from recent investors into payout for earlier contributors." They also explain their motivation, claiming, "we wanted to spread the gospel of Web3 and crypto to the students of Carnegie Mellon University, and what better way than to create a CMU-centered cryptocurrency?" According to their announcement, their end goal is to phase out flex-cash and replace it entirely with AndyCoins. "Students will soon be able to buy into this exciting new currency, and those who adopt early may even make a small profit once we see widespread acceptance."

The only new principle involved is that instead of the blockchain relying on proof-of-stake verification, the chain operates on a micro-bid-oriented matrix-scape wherein any front-end certifications are initially sent downstream to the public DAO server (provided that the bid tokens are still functionally fungible at the moment of a transaction). After a user sends a transaction request, a new appendage is made to the ledger after its vector multiples are consummated. The user is then sent an aggregated metadata packet which gets reoriented into a unique 64-bit hash ledger, allowing their crypto wallet to receive the appropriate funds. Spontaneous executions within the liminal void space are of course a concern, however the wire-stack permits integration of a null-key by verified DAO accounts to mitigate the effects of this. Furthermore, Linux-based aggregation dummies are entirely forbidden to minimize the need for null-admin interventions. A lymphatically-driven class arbitrator will also be semantically employed to prevent a consensus fork in the chain, thus encouraging token stability.

When asked what inspired this revolutionary new procedure, the team leader cited the principle of "minimally distal bar sequences'' pioneered by Herbert Simon. This principle, developed by legendary Carnegie Mellon University computer science professor Herbert Simon (the namesake of Newell-Simon Hall), demonstrates that low-echelon bin operators will always arbitrate the nearest local bar sequence in a skew-framework. The Crypto Cats have ingeniously employed this principle in such a way that the blockchain can more efficiently integrate the proximal components of the distal command network.

The announcement has also garnered attention from the founder of Ether, Vitalik Buterin, who attended a recent conference hosted by the Crypto Cats. "I'm so excited to see the future of computing getting so involved with Web3. Carnegie Mellon has been at the forefront of computer science for decades, and these kids are continuing that tradition by revolutionizing the efficiency with which blockchains can concentrate crypto-backed assets among select stakeholders". He added, "I'm particularly interested to see how these new ideas might be integrated into the metaverse".

Such exciting news. At any rate, this reporter is sold on the idea, and I look forward to the prospect of minting an NFT of Farnam Jahanian on the AndyCoin blockchain. To the moon!

See the original post:
Carnegie Mellon University Students Create New Cryptocurrency, dubbed AndyCoin - CMU The Tartan Online

Cryptocurrency Market Halves in H1 This Year – BusinessKorea

The Korea Financial Intelligence Unit announced on Sept. 26 that the aggregate value of the domestic cryptocurrency market dropped 58 percent to 23 trillion won in the first half of this year, when the number of cryptocurrencies in the market increased from 1,257 to 1,371.

According to the unit, the average daily trading value more than halved from 11.3 trillion won to 5.3 trillion won in the first half. The total won deposit as an investment demand indicator decreased from 7.6 trillion won to 5.9 trillion won and the operating profit of domestic cryptocurrency exchanges and related companies plummeted from more than 1.64 trillion won to 0.63 trillion won, it said.

The aggregate market value hit an all-time high in November last year and then kept falling until the end of June this year. The value fell below 40 trillion won with the Terra scandal in May and dipped below 30 trillion won with the bankruptcy of Celsius in June.

In the first half of this year, the number of cryptocurrency exchange users increased 24 percent to 6.9 million. More than 20 percent of the users are males in their 30s and those in their 30s and 40s account for 31 percent and 26 percent of the total, it said, adding that 68 percent of the customers are males.

Link:
Cryptocurrency Market Halves in H1 This Year - BusinessKorea

Physics – Breakthrough Prize for the Physics of Quantum Informationand of Cells – Physics

The idea of using the laws of quantum mechanics for computation was proposed in 1982 by Richard Feynman. But Deutschwho is at the University of Oxford, UKis often credited with establishing the conceptual foundations of the discipline. Computer bits that obey quantum principles, such as superposition and entanglement, can carry out some calculations much faster and more efficiently than ones that obey classical rules. In 1985 Deutsch postulated that a device made from such quantum bits (qubits) could be made universal, meaning it could simulate any quantum system. Deutsch framed his proposal in the context of the many worlds interpretation of quantum mechanics (of which he is an advocate), likening the process of one quantum computation to that of many parallel computations occurring simultaneously in entangled worlds.

To motivate further work in quantum computing, researchers at the time needed problems that a quantum computer could uniquely solve. I remember conversations in the early 1990s in which people would argue about whether quantum computers would ever be able to do anything really useful, says quantum physicist William Wootters of Williams College, Massachusetts, who has worked with Bennett and Brassard on quantum cryptography problems. Then suddenly Peter Shor devised a quantum algorithm that could indeed do something eminently useful.

In 1995 Shor, who is now at the Massachusetts Institute of Technology, developed an algorithm that could factorize large integersdecompose them into products of primesmuch more efficiently than any known classical algorithm. In classical computation, the time that it takes to factorize a large number increases exponentially as the number gets larger, which is why factorizing large numbers provides the basis for todays methods for online data encryption. Shors algorithm showed that for a quantum computer, the time needed increases less rapidly, making factorizing large numbers potentially more feasible. This theoretical demonstration immediately injected energy into the field, Wootters says. Shor has also made important contributions to the theory of quantum error correction, which is more challenging in quantum than in classical computation (see Focus: LandmarksCorrecting Quantum Computer Errors).

Without Deutsch and Shor we would not have the field of quantum computation as we know it today, says quantum theorist Artur Ekert of the University of Oxford, who considers Deutsch his mentor. David defined the field, and Peter took it to an entirely different level by discovering the real power of quantum computation and by showing that it actually can be done.

Data encryption is the topic cited for the award of Bennett (IBMs Thomas J. Watson Research Center in Yorktown Heights, New York) and Brassard (University of Montreal, Canada). In 1984 the pair described a protocol in which information could be encoded in qubits and sent between two parties in such a way that the information could not be read by an eavesdropper without that intervention being detected. Like quantum computing, this quantum cryptographic scheme relies on entangling qubits, meaning that their properties are interdependent, no matter how far apart they are separated. This BB84 protocol and similar quantum encryption schemes have now been used for secure transmission of data along optical networks and even via satellite over thousands of kilometers (see Focus: Intercontinental, Quantum-Encrypted Messaging and Video).

In 1993 Bennett and Brassard also showed how entanglement may be harnessed for quantum teleportation, whereby the state of one qubit is broadcast to another distant one while the original state is destroyed (see Focus: LandmarksTeleportation is not Science Fiction). This process too has applications in quantum information processing.

I am really gratified by this award because it recognizes the field of quantum information and computation, Shor says. Deutsch echoes the sentiment: Im glad that [quantum information] is now officially regarded as fundamental physics rather than as philosophy, mathematics, computer science, or engineering.

Deutsch, Shor, Bennett, and Brassard deserve recognition for their work, and Im delighted that theyre getting it, Wootters says. He notes that their research not only inspired the development of quantum technologies, but also influenced new research in quantum foundations. Quantum information theory views quantum theory through a novel lens and opens up a new perspective from which to address foundational questions.

Read the rest here:
Physics - Breakthrough Prize for the Physics of Quantum Informationand of Cells - Physics

The Israel Innovation Authority is building a new quantum computing research center – what will the impact be? – Diginomica

In July 2022, the Israel Innovation Authority announced a budget of NIS 100 million ($29 million) to build a quantum computing research center headed by Israeli startup Quantum Machines, which will also help create a quantum computer.

Israels new quantum computing center is part of the NIS 1.25 billion ($390 million) Israel National Quantum Initiative, launched in 2018 to facilitate relevant quantum research, develop human capital in the field, encourage industrial projects, and invite international cooperation on R&D.

Israel has about two dozen startups and companies currently focused on quantum technologies, including Quantum Machines, whichraised $50 millionlast September. The company was founded in 2018, and went on to develop a standard universal language for quantum computers, as well as a unique platform that helps them run.

According to the Times of Israel, Defense Ministrys Directorate of Defense Research and Development (DDR&D) will issue a separate tender to finance the development of quantum technologies for military use for another NIS 100 million, the innovation authority said. According to their joint announcement Tuesday, the budget will fund two parallel avenues. The Israel Innovation Authority will focus on developing the infrastructure for quantum computational ability, which, it said, may include the use of technology from abroad. Meanwhile, the Defense Ministrys Directorate of Defense Research and Development (DDR&D) will establish a national center with quantum capabilities that will work with academia, industry, and government partners to develop a quantum processor and a complete quantum computer.

Tech giants like Google, Microsoft, IBM, and Intel are allracingto make quantum computing more accessible and build their systems. Countries such as China, the US, Germany, India, and Japanare pouring millionsinto developing their quantum abilities.

According to recent marketprojections, the global quantum computing market size was expected to have been worth $487.4 million in 2021, and reach $3.7 billion by 2030. Israels $29 million is minuscule compared to the governments above, and the tech elephants.

These government-funded initiatives to achieve dominance in critical technology remind me of Japans Fifth Generation, which never really reached its goals.

Itamar Sivan, co-founder and CEO of Quantum Machines, said in a company statement that the project's goal was to give Israeli companies access to the most advanced quantum technologies and services so that they can develop deep quantum expertise across industry and academia. This expertise will allow Israeli companies across various sectors and industries to gain a leading global position.

Quantum Machines, founded in 2018, has built a hardware and software solution Quantum Orchestration Platform (QOP) for operating quantum systems to facilitate research and enable future breakthroughs. The startup also developed the QUA, a standard universal language for quantum computers that will allow researchers and scientists to write programs for varied quantum computers with one unified code. Quantum Machines, together with a consortium of Israeli and international quantum tech companies at the center, will build a quantum computer to be made available to the commercial and research communities.

Israels $29 million is minuscule compared to the governments above and tech elephants. According torecent market projections, the global quantum computing market is expected to grow from about $470 million in 2021 to about $1.765 billion by 2026.

Quantum Machines is an exciting company. They possess no quantum computer of their own, and their products are somewhat unique. While most quantum computers are in labs as objects of experiments by scientists, Sivan explained something I didnt realize to me. According to Sivan, a quantum computer needs three elements: a quantum computer and an orchestration platform of (conventional) hardware and software. There is no software in a quantum computer. The platform manages the progress of its algorithm mainly through laser beam pulses. The logic needed to operate the quantum computer resides with and is controlled by the orchestration platform.

The crucial difference between Google's and Quantum Machines' strategy is that Google views the current NISQ state of affairs as a testbed for finding algorithms and applications for future development. At the same time, Sivan and his company produced an orchestration platform to put the current technology into play. Their platform is quantum computer agnostic it can operate with any of them. Sivan feels that focusing solely on the number of qubits is just part of the equation.

The center will offer access to research and development on three quantum processing technologies superconducting qubits, cold ions, and optic compute and provide services to the Israeli quantum computing community, the Israel Innovation Authority said Sunday. As per the Times of Israel:

Ami Appelbaum, chairman of the Israel Innovation Authority, said the new center was 'the answer to an existing strategic market failure and is part of the authoritys policy of enabling the industry to maintain its leading position at the forefront of breakthrough and disruptive technologies.'

'Quantum computing is a technology Israeli industry cannot ignore,' said Israel Innovation Authority CEO Dror Bin in a statement Tuesday. 'The industry must develop knowledge and access to infrastructure in which it can develop growth engines for activities it will decide to lead.'

I've always believed that action speaks louder than words. While Google is taking the long view, Quantum Machines provides the platform to see how far we can go with current technology. As I wrote in The unpredictable rise of quantum computing - have recent breakthroughs accelerated the timeline?

Google suggests the real unsolved problems in fields like optimization, materials science, chemistry, drug discovery, finance, and electronics will take machines with thousands of qubits and even envision one million on a planar array etched in aluminum. Major problems need solving, such as noise elimination, coherence, and lifetime (a qubit holds its position in a tiny time slice).

Googles tactics are familiar. Every time you use TensorFlow, it gets better. Every time you play with their autonomous car, it gets better. Their collaboration with a dozen technically advanced companies improves their quantum technology.

Read more:
The Israel Innovation Authority is building a new quantum computing research center - what will the impact be? - Diginomica

CERN to host International Conference on Quantum Technology for High-Energy Physics (QT4HEP22) – CERN

We are pleased to announce that registration will open this week for the International Conference on Quantum Technology for High-Energy Physics, which will be hosted at CERN on 14 November 2022. The event will take place in the CERN Main Auditorium, with featured sessions being broadcast live.

The conference will serve as a forum to discuss both the potential of and the challenges surrounding the nascent quantum technology and what overall impact this new frontier of science might have on high-energy physics (HEP). Bringing the whole community together, we will discuss recent developments in the field and keep looking for those activities within HEP and beyond that can most benefit from the application of quantum technologies.

Spread across four days, the event will cover a number of topics ranging from four quantum technology areas (theory, sensing, computing and communication) to collaboration with academia and industry, entrepreneurship, training and education activities. There will also be a series of tutorials and hands-on sessions co-developed with companies and providers, to explore the fascinating field of quantum science to its fullest extent.

Following a successful workshop on quantum computing in 2018 that marked the beginning of a range of new investigations into quantum computing at CERN, this is the first edition of the QT4HEP conference and a great opportunity to share knowledge and ideas, advance quantum expertise and skills and foster common activities with academia and industry on national and international levels.

Join us as we unlock the full potential of innovative quantum technology and its great promise to support scientific research: https://indico.cern.ch/e/QT4HEP22.

_______________

About CERN QTI

The CERN Quantum Technology Initiative (CERN QTI) is a comprehensive R&D and knowledge-sharing initiative to investigate applications of quantum technologies for high-energy physics and beyond. Given CERNs increasing information and communications technology and computing demands, as well as the significant national and international interest in quantum-technology activities, CERN QTI aims to provide dedicated mechanisms for the exchange of both knowledge and innovation.

Find out more at quantum.cern and on Twitter and LinkedIn.Link to the roadmap: https://doi.org/10.5281/zenodo.5553774.

Here is the original post:
CERN to host International Conference on Quantum Technology for High-Energy Physics (QT4HEP22) - CERN

South Korea and the U.S. Open Several Centers to Collaborate on Quantum Research – Quantum Computing Report

South Korea and the U.S. Open Several Centers to Collaborate on Quantum Research

The Korea-U.S. Science Cooperation Center (KUSCO) announced five different centers to foster collaboration between U.S. and Korean universities on various quantum research projects. These include:

In addition, two professors from the University of Chicagos Pritzker School of Molecular Engineering (PME) were awarded $1 million to co-lead the creation of The Center for Quantum Error Correction. Also, a new Korea-US Quantum Technology Cooperation Center was open in Washington, D.C. last week to help provide support for quantum projects between the two countries.

Additional information about these activities is available in a press release posted on the University of Chicago web site here and also a news article posted on the Korea Times website here.

September 24, 2022

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Follow this link:
South Korea and the U.S. Open Several Centers to Collaborate on Quantum Research - Quantum Computing Report

Signal >> Documentation

XEdDSA and VXEdDSA

This document describes how to create and verify EdDSA-compatible signatures using public key and private key formats initially defined for the X25519 and X448 elliptic curve Diffie-Hellman functions. This document also describes "VXEdDSA" which extends XEdDSA to make it a verifiable random function, or VRF.

X3DH

This document describes the "X3DH" (or "Extended Triple Diffie-Hellman") key agreement protocol. X3DH establishes a shared secret key between two parties who mutually authenticate each other based on public keys. X3DH provides forward secrecy and cryptographic deniability.

Double Ratchet

This document describes the Double Ratchet algorithm, which is used by two parties to exchange encrypted messages based on a shared secret key. The parties derive new keys for every Double Ratchet message so that earlier keys cannot be calculated from later ones. The parties also send Diffie-Hellman public values attached to their messages. The results of Diffie-Hellman calculations are mixed into the derived keys so that later keys cannot be calculated from earlier ones. These properties give some protection to earlier or later encrypted messages in case of a compromise of a party's keys.

Sesame

This document describes the Sesame algorithm for managing message encryption sessions in an asynchronous and multi-device setting.

Here is the original post:
Signal >> Documentation

Indian Legislators Want The Government To Be Able To Intercept Encrypted Messages – Techdirt

from the residents-asked-to-pay-for-man-in-the-middle-attacks-against-them dept

India is still a democracy. Or so it pretends. But its becoming indistinguishable from autocratic regimes, like those found in some of its nearby neighbors, China, Turkey, and Pakistan.

Under Prime Minister Narendra Modi, India has become indistinguishable from dozens of other abusive regimes run by dictators, all while trying to uphold the pretense of democracy. Since Modis election in 2014, the government has endlessly sought ways to stifle dissent and monitor all local internet activity. The Indian government has taken legislative swipes against VPN providers, made third party platforms directly responsible for user-generated content, and leveraged fear-inducing (but poorly defined) terms like terrorism and fake news to propose and pass laws that expand already generous government snooping powers.

Despite its best efforts, the Indian government has been unable to outlaw device and communication encryption. But that hasnt stopped it from trying. If the government cant mandate backdoors, perhaps it can force providers of encrypted communication services to allow the government to BCC itself on communications it cant force out the hands of those providing end-to-end encryption.

The government has proposed a law to bring under a legal framework the interception of over-the-top communication services (OTT), such as WhatsApp and Signal which are encrypted, according to the new draft telecommunications bill uploaded late on Wednesday.

Presumably, this will be justified with assertions about national security and fighting rampant crime and corruption. The ends are a subversion of encrypted communications under the assumption that those who utilize encryption are criminals or subversives who must be spied on to secure the nation and, perhaps most importantly, secure Modis position.

The government will decided whos affected by this, no matter what the final language of the bill says. It is seeking public feedback on the bill, but history indicates the government wont be dissuaded by commenters who think the government should not give itself this much power.

The legislation would not only target text messages, but also allow the government to piggyback on encrypted voice and video calls. This gives it an opportunity to listen in on communications made by people whod rather not create a digital paper trail of text messages.

All the government would need to do is utter the magic words (terrorism, fake news, public safety, misinformation, crime, etc.) and encrypted services would be forced to become open books. Heres the relevant language:

Under section 24 of the draft, the central and state government, or any officer specially authorised in this behalf by the central or a state government can on the occurrence of any public emergency or in the interest of the public safety if it is satisfied that it is necessary or expedient to do so, in the interest of the sovereignty, integrity or security of India, friendly relations with foreign states, public order, or preventing incitement to an offence, for reasons to be recorded in writing, by order direct that any message or class of messages, to or from any person or class of persons received by any telecommunication services shall not be transmitted, or shall be intercepted or detained or disclosed to the officer mentioned in such order.

Governments not the governed have the power to decided what is in the interest of public safety. These two parties rarely see eye-to-eye. But only one of the parties has the power to decrypt communications. The Modi government and legislators who prefer fealty to serving the public are hoping this is what the future holds: a country where encryption no longer matters because the government has the power to insert itself into conversations between citizens. Vague language will permit the intrusion. The occasional recovery of something incriminating will be endlessly touted as justification for the laws existence. And if this means providers of encrypted communications are no longer willing to offer their services in India, it will give the government what it wants, without all the hassle of prosecuting entities that refuse to subject their users to government eavesdropping.

Filed Under: backdoors, encrypted messaging, encryption, india

Go here to read the rest:
Indian Legislators Want The Government To Be Able To Intercept Encrypted Messages - Techdirt

Deep data inspection: The overlooked element in government data security – GCN.com

When people think about data security in government, they immediately think about encryption. And rightfully so: Encrypting data at rest and in motion has been a best practice for the past decade. In recent years, however, the data security arsenal has expanded to include what is becoming known as deep data inspection.

Deep data inspection goes one step deeper into data security and looks inside packaged data for threats and quality defects.

We've been trained to believe that security threats -- malicious or unintentional exploits --emerge as data is first created. What has been overlooked in many instances, however, is that data quality issues are actually an intrinsic part of data security.

Deep data inspection is analogous in many ways to network-based deep packet inspection. In the earliest days of the internet, information crossed the internet in clear text. As hacking became more common, IT managers concluded they needed to look inside individual network packets to determine whether the data contained in those packets was legitimate.

Today, data security is beginning to conduct deep data inspection on data files especially those that fuel artificial intelligence and machine learning products that make sense of todays enormous data warehouses.

A comprehensive data security strategy now must include both inspection and encryption and, in fact, it makes the most sense to start with inspection. After all, if data is encrypted before it is inspected, its akin to locking the criminal inside the house, from a security perspective.

Consider the example of a comma-separated-value (CSV) file, similar to a spreadsheet. In the world of big data, these files can contain millions of rows and columns. Data files like these are typically encrypted because they must be protected as they move across the internet and are shared from one authorized user to the next. All thats needed is an intentional or unintentional exploit in a single cell in one file for systems to be corrupted, crashed or taken over.

Its essential, therefore, to be able to scan all those rows and columns to validate that not only are there no threats hidden in the data, but that the data itself is of good quality, properly formatted and ready for glitch-free AI modeling.

And lets not underestimate the importance of data quality in AI modeling. Because of the massive size of data files, AI is an absolutely essential part of turning data into useable information for both internal and external customers. It is therefore also an essential aspect of the health and performance of the network itself.

Data doesnt have to include malicious code to have a significant financial and operational adverse effect on AI models. Possible data corruption, incomplete data volumes, formatting errors, incomplete data or duplicate data are not only expensive from a storage and network management perspective; these problems also call into question the accuracy of AI modeling that makes big data useful to begin with. Thats why poor data quality can be as much of a network problem as security exploits.

Turning back to the larger issue, theres a curious dilemma inherent in data security. Cloud service providers often underscore that security is a shared responsibility; providers are responsible for security of the cloud, and users are responsible for security in the cloud. Cloud providers commonly expect that customers will encrypt their data.

But data encryption makes it more difficult to judge the quality of data. Ironically, in many of the most secure environments in which Ive worked, data encryption is regarded as a necessary evil at best, because of the limitations it puts on being able to examine data. If a data exploit has been proven, it becomes that much harder to find it once it has been encrypted.

None of this is to say that data shouldnt be encrypted, but its important to be aware of the issues that emerge from data encryption that make exploits or data quality problems harder to detect and isolate.

A comprehensive data security strategy, therefore especially as artificial intelligence becomes a commonplace method of analyzing and using data must be rooted in an understanding that both deep data inspection and data encryption are essential to network health. And in terms of order, deep data inspection must come before data encryption to get the best value from data at rest or in motion.

Dave Hirko is founder and principal of Zectonal.

Read more:
Deep data inspection: The overlooked element in government data security - GCN.com

Echoworx and Saepio Information Security Partner to Deliver Next-Gen Encryption – StreetInsider.com

Get instant alerts when news breaks on your stocks. Claim your 1-week free trial to StreetInsider Premium here.

TORONTO--(BUSINESS WIRE)--Echoworx, the industry leader in cloud-based email and statement encryption, announced today their partnership with Saepio Information Security, providing next-gen secure delivery of confidential and sensitive information to any email recipient in the world.

77% of tech leaders cited the need to increase protection of their documents and messages in transit, found a study conducted by Forrester on behalf of Echoworx. For businesses like Saepio a UK-founded managed services, advisory and technology implementation company providing future fit security strategies is a crucial step in protecting their clients from breaches and data loss.

Today's technology leaders are looking to implement leading-edge strategies. Through our partnership with Echoworx, were providing our customers an innovative, modernized approach to email and data protection, says Joseph Hedegaard Ganly, Solutions Architect at Saepio. We strive to deliver a three-tier policy, people, and product approach to information security and importantly, maintain it ongoing, and Echoworx helps us tackle this challenge for our clients beautifully.

The risks of cyber-crimes and data breaches are constantly evolving; having cyber and information security that evolves along with it is essential for keeping data safe, but also keeping up with client needs and meeting regulatory requirements.

451 Research said it best: Email security is making a strong case to be the next next-gen market in cybersecurity, says Rosario Perri, VP Channels EMEA at Echoworx. Working with consultative professionals, like Saepio, who only partner with a select group of trusted security vendors, means they truly understand the value of best practice security.

Kicking off the partnership, senior technology veterans from Echoworx and Saepio will be hosting a live event to top UK law firms this November in London, England.

About Echoworx

Echoworxs scalable, easy to use, and configurable cloud security and email encryption solutions, have been adopted by enterprises in more than 30 countries and 28 languages. Through their partnership with Saepio, Echoworx further demonstrates its commitment to providing enterprises with not just a product, but best-in-breed security solution.www.echoworx.com

View source version on businesswire.com: https://www.businesswire.com/news/home/20220926005068/en/

Echoworx Media ContactLorena MageeVP Marketing[emailprotected]+1 416 226-8600

Source: Echoworx

See the original post:
Echoworx and Saepio Information Security Partner to Deliver Next-Gen Encryption - StreetInsider.com