CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Quantum Computing
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Quantum Computing

Quantum computing processor showing encryption algorithms
Cyber SecurityInsights

A Legal View of New NIST Quantum-Resistant Algorithms

September 16, 2022
None of the candidate encryption algorithms to counter the threat of quantum computing are intended for the massive amounts of sensitive data stored “at rest”. Instead they are intended to replace those currently used for: (1) data in transit over the public internet; and (2) digital signatures used for authentication.
Read More
Processor in quantum computer showing encryption
Cyber SecurityNews

Chinese Researchers Use Quantum Computer to Crack RSA Encryption

October 21, 2024
Researchers at Shanghai University used the D-Wave quantum computer to demonstrate decryption of a working RSA public key. The incident does demonstrate that the timeline to crack encryption that is not quantum-resistant, something that many feel is still at least 10 years off, may be shorter than expected.
Read More
Futuristic and modern design of prototype showing quantum computing and encryption algorithms
Cyber SecurityInsights

Counting Down to Quantum? Here’s What Security Teams Need To Know

December 30, 2022
The post-quantum world is often described as a doomsday scenario. One of the biggest fears about quantum computing is its ability to break the traditional encryption algorithms that have protected our data for decades.
Read More
Quantum computing technology showing post-quantum cryptography
Cyber SecurityInsights

Financing Computing’s Next Great Disruption

September 20, 2022
Quantum computing now has the potential to capture nearly $700 billion in value as early as 2035. NIST is encouraging U.S. government entities and commercial enterprises to move forward more quickly towards post-quantum cryptography since data is getting harvested today for future decryption.
Read More
Electric system of car engine showing quantum computing impact on automotive cybersecurity
Cyber SecurityInsights

How Quantum Computing Could Affect the Automotive Landscape

February 7, 2023
The automotive industry uses cryptography extensively both in external and internal communication, as well as other uses. Due to the relative rigidity of automotive products, there is an urgent need to fit the vehicles to the quantum computing era as soon as possible.
Read More
Hacker working on a neon computer keyboard showing cyber risk of quantum computing
Cyber SecurityNews

Quantum Computing Attacks Still Years Off, but “Hack Now Decrypt Later” Presents Immediate Cyber Risk

October 7, 2022
A new poll from Deloitte finds there is an immediate and significant cyber risk from "harvest now decrypt later" (HNDL) attacks, in which attackers steal encrypted information and simply sit on it until quantum computing advances make it trivial to crack.
Read More
Processors and circuit board in blue glowing laser showing quantum computing threat to cryptographic standards
Cyber SecurityNews

Quantum Computing Threat Treated With Increasing Seriousness by Federal Government With Announcement of New Cryptographic Standards and Tools

August 5, 2022
Concrete steps to address the threat quantum computing poses to current cryptographic standards have been taken by NIST, as it has selected four algorithms for future use.
Read More
Quantum computing on digital background showing risk of broken public key encryption
Cyber SecurityInsights

The Elevated Risk of Broken RSA Public-Key Encryption Through Quantum Computer

February 20, 2023
Companies with significant amounts of sensitive stored data – whether stored on site or in the cloud -- should begin to invest in emerging quantum-resistant data storage, key management, and multiple encryption technologies.
Read More
Circuit board showing quantum computing and cryptography
Cyber SecurityInsights

The Future Is Quantum – How Organisations Can Prepare Themselves

December 29, 2022
Migrating to quantum resistant algorithms will take years to integrate into existing systems and processes. Organisations need to achieve crypto-agility – the ability to change, improve, and revoke cryptographic assets to successfully deal with quantum threats.
Read More

Latest

Mobile phone and lock icons showing messaging app security breach

High Security Messaging App Tool Used by US Government Suspends Service After Security Breach

TikTok logo on smartphone showing data transfers of EU data

TikTok to Receive €530 Million Fine Over EU Data Storage, Data Transfers to China

Headset on laptop showing IT help desks social engineering attack

IT Help Desks Across UK Victimized by “DragonForce” Social Engineering Attack

Hacker using laptop showing data theft from cyber attack

The Co-op Confirms Significant Data Theft from an Apparent Dragonforce Ransomware Cyber Attack

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results