CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Quantum Computing
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Quantum Computing

Quantum computing on digital background showing risk of broken public key encryption
Cyber SecurityInsights

The Elevated Risk of Broken RSA Public-Key Encryption Through Quantum Computer

February 20, 2023
Companies with significant amounts of sensitive stored data – whether stored on site or in the cloud -- should begin to invest in emerging quantum-resistant data storage, key management, and multiple encryption technologies.
Read More
Electric system of car engine showing quantum computing impact on automotive cybersecurity
Cyber SecurityInsights

How Quantum Computing Could Affect the Automotive Landscape

February 7, 2023
The automotive industry uses cryptography extensively both in external and internal communication, as well as other uses. Due to the relative rigidity of automotive products, there is an urgent need to fit the vehicles to the quantum computing era as soon as possible.
Read More
Futuristic and modern design of prototype showing quantum computing and encryption algorithms
Cyber SecurityInsights

Counting Down to Quantum? Here’s What Security Teams Need To Know

December 30, 2022
The post-quantum world is often described as a doomsday scenario. One of the biggest fears about quantum computing is its ability to break the traditional encryption algorithms that have protected our data for decades.
Read More
Circuit board showing quantum computing and cryptography
Cyber SecurityInsights

The Future Is Quantum – How Organisations Can Prepare Themselves

December 29, 2022
Migrating to quantum resistant algorithms will take years to integrate into existing systems and processes. Organisations need to achieve crypto-agility – the ability to change, improve, and revoke cryptographic assets to successfully deal with quantum threats.
Read More
Hacker working on a neon computer keyboard showing cyber risk of quantum computing
Cyber SecurityNews

Quantum Computing Attacks Still Years Off, but “Hack Now Decrypt Later” Presents Immediate Cyber Risk

October 7, 2022
A new poll from Deloitte finds there is an immediate and significant cyber risk from "harvest now decrypt later" (HNDL) attacks, in which attackers steal encrypted information and simply sit on it until quantum computing advances make it trivial to crack.
Read More
Quantum computing technology showing post-quantum cryptography
Cyber SecurityInsights

Financing Computing’s Next Great Disruption

September 20, 2022
Quantum computing now has the potential to capture nearly $700 billion in value as early as 2035. NIST is encouraging U.S. government entities and commercial enterprises to move forward more quickly towards post-quantum cryptography since data is getting harvested today for future decryption.
Read More
Quantum computing processor showing encryption algorithms
Cyber SecurityInsights

A Legal View of New NIST Quantum-Resistant Algorithms

September 16, 2022
None of the candidate encryption algorithms to counter the threat of quantum computing are intended for the massive amounts of sensitive data stored “at rest”. Instead they are intended to replace those currently used for: (1) data in transit over the public internet; and (2) digital signatures used for authentication.
Read More
Processors and circuit board in blue glowing laser showing quantum computing threat to cryptographic standards
Cyber SecurityNews

Quantum Computing Threat Treated With Increasing Seriousness by Federal Government With Announcement of New Cryptographic Standards and Tools

August 5, 2022
Concrete steps to address the threat quantum computing poses to current cryptographic standards have been taken by NIST, as it has selected four algorithms for future use.
Read More

Latest

Hand on laptop keyboard showing data breach of Australia financial service provider

Data Breach of Financial Service Provider Latitude Jumps From 328,000 to 14 Million Records Stolen

Prancing horse on Ferrari logo showing data breach impacting customer data

Ferrari Disclosed a Data Breach Impacting Customer Data but Refused to Pay Ransom

Hacker using laptop showing penetration test and attack surface

The Anatomy of a Comprehensive Penetration Test

Smartphone with Twitter logo and Elon Musk on background showing source code leak

Partial Twitter Source Code Leak on GitHub Uploaded Shortly After First Round of Layoffs

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results