[go: up one dir, main page]

iTWire TV 160x1200notfunny

iTWire TV 160x1200notfunny

iTWire TV 705x108notfunny

Wednesday, 17 July 2024 11:09

Quantum investment spurs global interest in Agile Cybersecurity

By Andrew Wilson
Andrew Wilson, CEO, Senetas Andrew Wilson, CEO, Senetas

GUEST OPINION: The Australian government’s hefty near $1 billion investment in quantum computing technology has piqued global interest and positioned Australia as a leader in this cutting-edge field. This investment highlights the significance of quantum technology in advancing science, but also the threat it poses to cybersecurity.

Quantum computers, despite their current limitations of being too small and error-prone, represent a future threat to encryption standards that safeguard sensitive data. This has led to global, albeit secretive, agreements among nations to impose identical export controls on quantum computers. Countries such as the UK, France, Spain, and the Netherlands have set specific bans on the export of quantum computers with more than 34 qubits and below a certain error threshold without fully disclosing the scientific reasoning behind these specifications. Such measures seem to be aimed at preemptively curbing the distribution of potentially more capable machines that can be used to break today’s conventional encryption.

The rest of the world is not standing idly whilst we await the first quantum computers. Senetas and its cybersecurity partner Thales have been actively engaging with stakeholders in Indonesia, Malaysia, and the Philippines, discussing the future landscape of cybersecurity in a quantum age. Senetas has also signed deals of significance this year with customers in the Middle East, where it is a trusted supplier in the whole region.

Currently, the dialogue with many of these nations focuses on the necessity for agile cybersecurity solutions that can swiftly adapt to new encryption standards (once established) by authorities like the U.S. National Institute of Standards and Technology (NIST). NIST has stated that the industry can expect a quantum-safe crypto standard to be announced in the coming months.

How can you prepare against a threat, when no proven cryptographic or algorithmic standards have been proven to be a capable defence? Developing platform, cryptographic, and network agility is the key.

In plain English, this means ensuring that systems implemented today can quickly adapt to new encryption standards once they become available without extensive overhauls. They must be capable of working with all known networks, data types, topologies, etc.

With the advent of quantum around the corner, the optimal approach is agility. Viable methods of encrypting data are essential for maintaining security and operational continuity around the world. For some this will be adoption of new encryption standards (for example those put forward by bodies such as NIST) and for others the ability to deploy custom encryption standards (such as those used by some nation-states) is paramount.

The tech community, particularly the cybersecurity industry, has discussed the impact of quantum technology by bad actors for over a decade. The enactment of international export controls—despite current quantum computers' limitations—signals a cautious approach to handling the technology’s potential implications for national security and a tacit recognition that what is still currently theory may soon become practice. Nation-states are acting now, and corporate custodians of sensitive information will be sure to follow.

Read 828 times

Please join our community here and become a VIP. Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here




IDC WHITE PAPER: The Business Value of Aiven Data Cloud Solutions

According to IDC, Aiven enables your teams to perform more efficiently, reduce direct infrastructure costs, and provide improved database performance, agility and scalability.

Find out how Aiven makes teams 48% more efficient, allowing staff to focus on high-value activities that drive real business results:

340% 3-year ROI – break even in 5 months (average)

37% lower 3-year cost of operations

78% reduction in staff time for database deployments


Download the IDC White Paper now

DOWNLOAD WHITE PAPER!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Share News tips for the iTWire Journalists? Your tip will be anonymous

Subscribe to Newsletter

*  Enter the security code shown:

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments