Remove 2030 Remove Encryption Remove Technology
article thumbnail

Q&A: Cybersecurity in ‘The Intelligent Era’

IT Security Guru

world, represent perhaps the most disruptive technology to transform IT, our industries and how businesses operate. Verified Identity, access permission controls, data encryption are all challenges for the cybersecurity industry in a world of autonomous machines!

article thumbnail

MY TAKE: Securing the Internet of Everything: why self-healing devices are the next frontier

The Last Watchdog

I had an edifying conversation about this with Steve Hanna , distinguished engineer at Infineon Technologies , a global semiconductor leader in power systems and IoT, based in Neubiberg, Germany. New generations of microchips can embed encryption, monitoring and control capabilities into devices at the edge at scale.

Internet 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What it Takes to Achieve Saudi Arabia’s Vision 2030

Thales Cloud Protection & Licensing

What it Takes to Achieve Saudi Arabia’s Vision 2030. SAUDI ARABIA’S VISION 2030. Through Vision 2030, the Kingdom of Saudi Arabia (KSA) intends to reduce dependence on oil, diversify its economy, and develop public service sectors, such as health, education, infrastructure, recreation, and tourism. Encryption. Compliance.

article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

Addressing third-parties Allen founded The Santa Fe Group in 1995 and established it as a leading consultancy, specializing on emerging technologies. By 2030, 50 percent of employees are expected to be contract workers, Allen noted. And once you have that, then you have the ability to reverse algorithms and unlock encryption.

Risk 164
article thumbnail

G7 Cyber Expert Group Warns of Quantum Computing Risks in Finance

SecureWorld News

While quantum advancements promise groundbreaking changes, they also threaten the security of current encryption standards widely used in financial systems. The CEG recommends that financial authorities and institutions take immediate action to evaluate their cryptographic methods and plan for a transition to quantum-safe encryption.

Risk 112
article thumbnail

Can smart cities be secured and trusted?

Thales Cloud Protection & Licensing

It is the year 2030, and you have had another busy day. With this seamless interaction of the latest IoT technologies, “smart cities” are redefining the way we live and work. There’s just one problem…these massive, radical, interconnected technology systems also raise serious privacy and security concerns.

article thumbnail

Cybersecurity Snapshot: Tenable Highlights Risks of AI Use in the Cloud, as UK’s NCSC Offers Tips for Post-Quantum Cryptography Adoption

Security Boulevard

Migration to PQC can be viewed as any large technology transition. These powerful quantum computers are expected to become generally available at some point between 2030 and 2040. National Institute of Standards and Technology (NIST) last year released three quantum-resistant algorithm standards that are ready to be adopted.

Risk 69