Inside Advanced Scale Challenges|Tuesday, August 21, 2018
  • Subscribe to EnterpriseTech Weekly Updates: Subscribe by email

data encryption

How to Fight the Coming Quantum Data Decryption Threat

Is quantum computing 15 years away? Twenty? Is a nation state or threat actor secretly already using it? Are threat actors already capturing and storing your data, hoping some ...Full Article

IoT Developers Look to Blockchain for Security

Securing the Internet of Things appears to have advanced well beyond default factory settings to include data and network security features baked into IoT components as well as comprehensive ...Full Article

Quantum Computers Threaten Data Encryption

The promise of quantum computing comes with a major downside: "Cryptographically useful" quantum machines will threaten public key encryption used to secure data in the cloud, a new report ...Full Article

Google Expands Cloud Encryption Options

Responding to growing concerns about cloud security and data governance across different platforms, Google is expanding its cloud security options with the release of encryption key management service. The ...Full Article

Data Encryption in the Cloud Falls Short

As more data and enterprise applications are moved to public cloud services, a surprisingly high number of enterprises responding to a new cloud security survey said they are not ...Full Article

Study: NSA Spying Fallout Extends Beyond Cloud

U.S. National Security Agency digital surveillance programs that were previously estimated to cost U.S. cloud vendors as much as $35 billion in sales by 2016 could "far exceed" that ...Full Article

A Quantum Leap for Classical Computing

<img src="http://media2.hpcwire.com/dmr/threequbitsiliconchip.jpg" alt="" width="95" height="59" />For all quantum computing's potential, there is still doubt whether its implementation is even feasible. But according to a trend among recent findings, quantum computing ...Full Article
Do NOT follow this link or you will be banned from the site!