In the third episode of ISMG's "APAC Insights" series, Equicom Savings Bank's Rei Nikolai Magnaye and former Indian Navy cybersecurity expert Rishi Das explain why cyberpsychology matters and how quantum computing advances could threaten enterprise networks.
As quantum computing continues to evolve, cybersecurity professionals and enterprise leaders must grapple with a future where current encryption technologies - on which our entire digital infrastructure is built - may no longer be secure. What next steps must they take now?
The acquisition of D'Crypt strengthens ST Engineering's cryptographic and high-security engineering capabilities while addressing evolving OT cybersecurity challenges in critical infrastructure sectors, said Goh Eng Choon, president of cyber at ST Engineering.
What's the worst-case scenario for a certificate authority? Citing years of "concerning behaviors," Google and Mozilla are set to treat all new digital certificates issued with Entrust as "untrustworthy," and have urged users to obtain new certificates from a trusted CA.
With quantum computers threatening to break current cryptographic systems sooner than expected, organizations must transform their security infrastructure. Quantum migration requires not just technological solutions but also talent development and awareness, said Professor Lam Kwok Yan, AVP at NTU.
October is National Cyber Security Awareness Month, a month-long effort led by the U.S. Department of Homeland Security that's now in its twenty-first year. This campaign provides best-practice measures in cybersecurity and strives to help organizations and people combat today's cyberthreats.
Quantum computing has been evolving for decades and holds immense promise. Companies have invested billions of dollars in this technology, which will eventually solve complex business problems. But for now the use cases are limited, said Kawin Boonyapredee, chief strategy officer at Applied Quantum.
The United States is preparing for an age of quantum computing as federal agencies roll out initiatives designed to boost "quantum readiness" and as experts warn the government may face issues that delay its ability to defend against a future of advanced threats enabled by the emerging technology.
An international law enforcement operation dismantled the Ghost encrypted messaging service in a takedown that resulted in the arrest of 51 suspects across three continents including alleged members of the Italian Mafia and motorcycle gangs. Australian police arrested Ghost's alleged administrator.
In the latest weekly update, ISMG editors discussed the implications of the recent arrest of Telegram's CEO in Paris for encrypted messaging services, the transformative impact of artificial intelligence in cybersecurity, and the latest regulations designed to curb fraud in electronic payments.
The arrest and indictment of Telegram CEO Pavel Durov is sparking concerns about the viability of encrypted communications in France. The Paris Prosecutor's Office indicted Durov, the 39-year-old Russian-born owner of Telegram on Wednesday, after arresting him Saturday night.
The Saturday evening arrest of Telegram CEO Pavel Durov by French law enforcement agencies thrust the already controversial social media platform further into the international spotlight as Paris authorities said the Russian billionaire will likely remain in custody at least through Wednesday.
The National Institute of Standards and Technology, a global trendsetter for cryptographic standards, announced the publication of a post-quantum standard for general encryption and two digital signature standards. The agency solicited proposals in December 2016 and selected the algorithms in 2022.
Singapore-based telecom giant Singtel launched the country's first quantum-safe network across its identity and authentication platforms to help enterprises protect data from potential future quantum computing-related threats. The network integrates with Cisco, Fortinet and Nokia solutions.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.