post quantum cryptography, systems integrator, data privacy, encryption, Exchange quantum-safe

Players, Algorithms and Cryptography: The Invisible Picture Behind Data Privacy

In cryptography, the familiar RSA encryption scheme, a public-key cryptosystem, cannot be considered entirely secure in a modern context ...
Security Boulevard

NIST’s Post-Quantum Cryptography Standards

Quantum computing is a completely new paradigm for computers. A quantum computer uses quantum properties such as superposition, which allows a qubit (a quantum bit) to be neither 0 nor 1, but ...

On the Subversion of NIST by the NSA

Nadiya Kostyuk and Susan Landau wrote an interesting paper: “Dueling Over DUAL_EC_DRBG: The Consequences of Corrupting a Cryptographic Standardization Process“: Abstract: In recent decades, the U.S. National Institute of Standards and Technology ...
What Happens to Your Social Media Accounts After You Die?

What Happens to Your Social Media Accounts After You Die?

In our August monthly show co-hosts Kevin Johnson and Scott Wright join Tom Eston to discuss what happens to your social media accounts…after you die! This is a topic we don’t hear ...
Dangerous Social Media Algorithms, A Moral Imperative for AI Powered Weapons?

Dangerous Social Media Algorithms, A Moral Imperative for AI Powered Weapons?

In episode 159: Will algorithms be the death of social media and why the US government thinks it has a moral imperative to build AI powered weapons. ** Links mentioned on the ...

Fooling NLP Systems Through Word Swapping

MIT researchers have built a system that fools natural-language processing systems by swapping words with synonyms: The software, developed by a team at MIT, looks for the words in a sentence that ...
Badge identity Teleport auth AI Adoption Lags cloud bias AI identity verification Open Raven

Concentric Applies Deep Learning Algorithms to Data Security

Fresh off raising an additional $7 million in funding, Concentric has launched a tool that employs deep learning algorithms to enable cybersecurity teams to identify documents and repositories where sensitive data has ...
Security Boulevard

Artificial Personas and Public Discourse

Presidential campaign season is officially, officially, upon us now, which means it's time to confront the weird and insidious ways in which technology is warping politics. One of the biggest threats on ...

Manipulating Machine Learning Systems by Manipulating Training Data

Interesting research: "TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents": Abstract:: Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time ...
data, compliance, audit Box data security, management, organizations, GDPR, Strike Force privacy, vendors, RFPs, cloud, data security DLP Iran DUMPS Conti Hackers Sandbox government HackerOne IBM data security

Survey Says Quantum Computing a Cybersecurity Threat

Now that quantum computers are moving from theory into the realm of experimental, many cybersecurity professionals are starting to appreciate a simple fact: Computers capable of cracking the most sophisticated encryption algorithms ...
Security Boulevard