article thumbnail

What’s Next in Engineering Technology? Part 2

Synergis Software

In a previous blog post I wrote about near-term technology trends affecting Adept users. Today I want to discuss how I identify and track such trends. I thought this would be a two-part series of articles, but I’ll need a Part 3 to share my thoughts on long-term technology trends affecting the larger world of engineering.

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Not every application or network requires military-grade encryption – however, enterprise organizations can’t go wrong with the services offering the most strength. ECC has proven to be a popular choice for web applications , blockchains , and mobile devices as a fast, lightweight yet secure alternative to RSA.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 April 2024

IT Governance

NATO to launch new cyber centre Acknowledging that “cyberspace is contested at all times”, NATO will create a new cyber centre at its military headquarters in Mons, Belgium. James Appathurai, NATO’s deputy assistant secretary general for innovation, hybrid and cyber, said the new centre would be modelled on the UK’s NCSC.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

These trends imply a need for a rapid, cross-departmental response that originates at the top level, as well as a greater unity between matters of cyber-risk and matters of corporate strategy and resourcing. Key to effective implementation will be ensuring that directors and cyber-professionals are speaking the same language.

article thumbnail

Federal Agency Data is Under Siege

Thales Cloud Protection & Licensing

For example, just last month Strava, a popular fitness navigation app, accidentally revealed the location of military bases in war zones worldwide potentially putting troops and U.S. We’ve also seen instances of U.S. citizens’ personal data being made available to the public, which has heightened awareness with government officials.