article thumbnail

Anatomy of a Quantum Attack

Thales Cloud Protection & Licensing

A conventional computer would need 300 trillion years to break RSA encryption – considered the gold standard for Public Key Encryption (PKE). In the hands of the enemy, a quantum computer capable of destroying RSA- encrypted data would have devastating effects on our critical infrastructure and economy. NATO, the U.S.

article thumbnail

Federal Agency Data is Under Siege

Thales Cloud Protection & Licensing

Originally Featured in Global Military Communications Magazine’s June/July Issue. The 57 percent rate statistic is the highest of all verticals we measured in this year’s report (others include the healthcare industry, the retail industry, and the financial services industry) or any region surveyed. What are the challenges involved?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

The Last Watchdog

Now comes an extensive global survey from Sophos, a leader in next generation cybersecurity, that vividly illustrates how cybercriminals are taking full advantage. Murray: Almost half of survey respondents didn’t fully understand their responsibilities for securing cloud environments. How do you explain that?

Cloud 127
article thumbnail

The Hacker Mind Podcast: Tales From A Ransomware Negotiator

ForAllSecure

” Over the next few weeks, chats from encrypted Telegram, and other communications were leaked. And so, a lot of times once the encryption occurs, that's really the final stage. They found what they believed to be sensitive data and then they perform the encryption. Of the of the incident. What's the first step?

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Encrypting critical data assets. In PricewaterhouseCoopers’ 2017 Annual Corporate Directors Survey, seventy-two percent of directors expressed a desire to increase cybersecurity expertise on their boards. Encrypting Critical Data Assets. Creating an enterprise-wide governance structure. Implementing a Targeted Guidance Strategy.

article thumbnail

The Hacker Mind Podcast: The Hunt for Ghost #1

ForAllSecure

There is of course a lot of security around these digital releases, for example, there's watermarks, digital certificates, and even keys at the code, the encrypted copies of the films in specific theaters for specific periods of time. Yet, somewhere in China. When digital production servers slipped through the cracks.