article thumbnail

Protecting Against the Risks and Managing the Complexities of a Quantum World with Thales and IBM Consulting

Thales Cloud Protection & Licensing

Read the customer case study from a large leading financial institution. For those in industries who will be heavily impacted by PQC, such as anyone leveraging PKI, TLS, Code Signing, IoT, or Secure Manufacturing, the next few years will be revolutionary from an IT perspective.

Risk 87
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

My healthcare is always going to be one again, it's a vertical healthcare and education, both where you have large amounts of very sensitive information, but not necessarily the budgets to secure it effectively. It's almost like we're doing a global global economics case study as to what happens and how it happens.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Most device or software manufacturers place backdoors in their products intentionally and for a good reason. User education is one of the most powerful tools for preventing malicious mobile apps. While this case study is just a snapshot, vigilance in the app store is required. Backdoors. Phishing and Social Engineering.

Phishing 104
article thumbnail

The Unobserved Need

Positively RIM

Last week I traveled to rural Indiana to research a case study of a mid-size manufacturing firm. The need for education is great, but few address it. It may be as unglamorous as a midsize manufacturing business in rural Indiana. In the U.S. alone, there are close to 100,000 small to mid-size businesses.