article thumbnail

Browser Makers and EU Face Off Over QWACs

Data Breach Today

EU Set to Approve Revised ID Framework to Digitize Public Service Access by 2030 A European effort to wrest greater control over the infrastructure underpinning internet encryption has some security experts warning about degraded website security.

article thumbnail

What it Takes to Achieve Saudi Arabia’s Vision 2030

Thales Cloud Protection & Licensing

What it Takes to Achieve Saudi Arabia’s Vision 2030. SAUDI ARABIA’S VISION 2030. Through Vision 2030, the Kingdom of Saudi Arabia (KSA) intends to reduce dependence on oil, diversify its economy, and develop public service sectors, such as health, education, infrastructure, recreation, and tourism. Encryption.

IT 77
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Future of Transportation Is Electric

HID Global

Approximately 26 million EVs will be on the road by 2030, and HID's RFID technology provides secure end-to-end encryption to power secure user credentials.

article thumbnail

How 5G Operators Can Prepare for The Quantum Era

Thales Cloud Protection & Licensing

Hybrid cryptography can secure data in motion by combining symmetric encryption with public key ciphers. With 5G networks expected to be in their prime by 2030, without adequate quantum-safe protections, they will be exposed and vulnerable to attack-capable quantum computers. Find Thales in Hall 2, Stand 2J30.

Risk 71
article thumbnail

Can smart cities be secured and trusted?

Thales Cloud Protection & Licensing

It is the year 2030, and you have had another busy day. For more information on Thales’s data encryption technologies, please visit our website to learn about “Advanced Data-at-rest Encryption, Access Control and Data Access Audit Logging”. Panic sets in, but you push past it and put a plan into motion.

Security 113
article thumbnail

The rise of cyber crime

IT Governance

The president of the National Health Information Sharing and Analysis Center said, “Ransomware will continue to be a threat and evolve, not to just encrypting data, but also to blackmailing data owners based on the content of the data”. Looking back 20 years, the most common cyber attacks were malicious code, Trojans and advanced worms.

article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

By 2030, 50 percent of employees are expected to be contract workers, Allen noted. And once you have that, then you have the ability to reverse algorithms and unlock encryption. “AI offers opportunities, but also problems in terms of trying to assess a particular device or a particular software program,” Allen observed.

Risk 120