now browsing by tag


#cybersecurity | #hackerspace | Trusted Computing Group Honors KIOXIA’s Hiroshi Isozaki for Contributions to Standards Development

Source: National Cyber Security – Produced By Gregory Evans

SAN JOSE, Calif.–(BUSINESS WIRE)–The drive to secure and protect data in PCs and data centers shows no signs of slowing down, and KIOXIA continues to lead the way when it comes to SSD security. KIOXIA America, Inc. (formerly Toshiba Memory America, Inc.) today announced that Hiroshi Isozaki, chief specialist for KIOXIA Corporation, has been honored … Continue reading “Trusted Computing Group Honors KIOXIA’s Hiroshi Isozaki for Contributions to Standards Development”

The post Trusted Computing Group Honors KIOXIA’s Hiroshi Isozaki for Contributions to Standards Development appeared first on Trusted Computing Group.

*** This is a Security Bloggers Network syndicated blog from Trusted Computing Group authored by TCG Admin. Read the original post at:

Source link

The post #cybersecurity | #hackerspace |<p> Trusted Computing Group Honors KIOXIA’s Hiroshi Isozaki for Contributions to Standards Development <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | #hackerspace | Quantum Computing Is Coming: Are You Cyber Ready?

Source: National Cyber Security – Produced By Gregory Evans

We’ve been hearing about the vast potential of quantum computing for years. With its exponentially superior processing power, this game-changing technology is expected to dramatically transform fields such as medical sciences, machine learning, particle physics, engineering and meteorology. Although widespread adoption is still in the future, 2019 marks a turning point in its commercial availability.

In January, IBM introduced the world’s first circuit-based commercial quantum computer, the IBM Q System One. This milestone in bringing quantum technology out of the lab and into real-world production environments is motivating IT to come to terms with its opportunities and risks.

Cybersecurity is among the top challenges to consider because industry experts predict that future quantum computers will soon be able to break today’s most sophisticated algorithms. According to “Quantum Computing: Progress and Prospects,” a recent report by the National Academy of Sciences, analysts agree that the time to start preparing for a quantum-safe future is now. For the time being, RSA and ECC algorithms still remain safe. However, the National Academy states that a powerful quantum computer theoretically could crack even a sophisticated 2048-bit RSA key in just a few months. In any case, enterprise and government organizations will need significant time to develop, standardize, and deploy new cryptographic algorithms that can withstand quantum computing threats—post-quantum cryptography (PQC).

The urgency of the risk is clear, especially for IoT-intensive industries. Businesses with IoT devices and applications that have long life cycles may have their products operating out in the world after the first quantum computers become a threat. That means products that had once been considered safe could become a liability. Some examples might include ATMs or automobiles with sensors, onboard computers and connections to the internet. If quantum-safe strategies are not put in place today when manufacturing these devices or products, they could be breached in the future. To be fully protected, businesses need to start addressing the quantum computing threat as soon as possible.

Broad Awareness of Quantum Computing and Plans for Action

For many organizations, the first steps toward managing quantum computing risks are not always clear. In some cases, enterprises may have only a limited understanding of PQC. To learn more about how enterprises are preparing for these new challenges, DigiCert commissioned ReRez Research of Dallas to survey IT professionals within 400 enterprises of 1,000 or more employees in the U.S., Germany and Japan. Participants included IT directors, IT security managers and IT generalists across a variety of industries.

The survey revealed that enterprise IT is well-aware of the threat that quantum computing poses to cryptography. Slightly more than half (55%) said quantum computing is a “somewhat” to “extremely” large threat today, with 71% saying it will be a “somewhat” to “extremely” large threat in the future.

However, the survey also underscored the fact that PQC is a new concept and that people are still learning about its meaning and significance. In fact, in a question designed to gauge understanding of the term, fewer than two-thirds of participants chose the correct definition of PQC.

Survey participants generally agree that the threat is rapidly approaching. The median response for when PQC would be required to combat new risks was 2022—just three years from now. With the threat on the horizon, 83% of respondents said it was “somewhat” to “extremely” important for IT to learn about quantum-safe security practices.

IT is also clear about the cryptographic risks they face from quantum computing. Survey respondents said they worry that the cost of fighting future quantum computing threats or attacks will spiral out of control. They are also concerned that data that is considered safely encrypted by today’s standards will become easy to decrypt in a quantum future, in which stolen data that may be safe for the moment could become vulnerable in the future.

A Proactive Approach is Key

With so much concern about post-quantum risks, putting a forward-looking strategy in place is essential to mitigating tomorrow’s threats. The DigiCert/ReRez survey identified three best practices for organizations seeking to secure their operations, including:

  • Knowing your specific risk and establishing a quantum crypto maturity model.
  • Understanding the importance of crypto-agility in your organization, and making it a core practice.
  • Working with leading vendors to establish digital certificate best practices and ensure they are tracking PQC industry progress to help you stay ahead of the curve, including with their products and solutions.

It’s not surprising that 95% of survey respondents reported that they are discussing at least one tactic to prepare for quantum computing. Organizations are also beginning to take the first steps to fund their initiatives: One-third indicated they have a PQC budget in place, while another 56% are working on establishing one.

Although the challenges of quantum computing are daunting, with advance planning backed by a solid strategy, organizations still have time to get ahead of tomorrow’s cybersecurity challenges.

To review a copy of the DigiCert 2019 Post Quantum Crypto Survey, visit

Recent Articles By Author

Source link

The post #cybersecurity | #hackerspace |<p> Quantum Computing Is Coming: Are You Cyber Ready? <p> appeared first on National Cyber Security.

View full post on National Cyber Security

International Conference on Emerging Topics in Computing (iCETiC)

General Cybersecurity Conference

 August 23 – 24, 2018 | London, United Kingdom

Cybersecurity Conference Description

The International Association of Educators and Researchers (IAER), registered CIC (Community Interest Company) in England and Wales, is happy to arrange the First International Conference on Emerging Technologies in Computing (iCETiC ’18) 2018, which will be held from 23rd -24th August, 2018, at London Metropolitan University, London, UK.

The conference will draw together researchers and developers from academia and industry. iCETiC’18 Proceedings will be published in the Springer-Verlag Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) Series, in cooperation with EAI. Selected papers for consideration for further publication from the conference may be recommended to the affiliated journals, please refer to the Call for Paper for more information.

There will be a range of events from keynote addresses, technical and poster sessions, workshops and tutorials. The formal sessions will be supplemented by an excellent social programme exploring the Greenwich UNESCO World Heritage Site.


The post International Conference on Emerging Topics in Computing (iCETiC) appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

International #Summit on #Telecommunications,#Cloud #computing and #Wireless #Technology

General Cybersecurity Conference

 August 23 – 28, 2018 | Outram Rd, Singapore

Cybersecurity Conference Description

Telecommunications 2018 is a leading forum for Business professionals, Scientists, Professor, Directors of companies, Delegates, Industrialists, Researchers and Students in the field of Telecommunication & Wireless to exchange information on their latest research progress and with a theme “Emerging Innovation in communication and wireless technology for connecting the world” to cover almost all aspects and fields of Telecommunications, Cloud computing and Wireless Technology.

Importance and Scope

International Summit on Telecommunications, Cloud computing and Wireless Technology is organizing an outstanding Scientific Exhibition/Program and anticipates the world’s leading specialists involved in Telecommunications, Cloud computing and Wireless Technology . Your organization will benefit with excellent exposure to the leaders in Wireless and Telecommunication. You can update your knowledge about current situation of Telecommunication &Wireless Technology and receive name recognition at this 2-day event. Telecommunications 2018 is an exciting opportunity to showcase the new technology. World-renowned speakers, the most recent techniques, tactics, and the newest updates in Telecommunications, Cloud computing and Wireless Technology fields are hallmarks of this conference.


The post International #Summit on #Telecommunications,#Cloud #computing and #Wireless #Technology appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Computing Conference

General Cybersecurity Conference

 July 10 – 12, 2018 | London, United Kingdom

Cybersecurity Conference Description 

Computing Conference (formerly called Science and Information (SAI) Conference) is a research conference held in London, UK since 2013. The conference series has featured keynote talks, special sessions, poster presentation, tutorials, workshops, and contributed papers each year.

Despite the short history of computer science as a formal academic discipline, it has made a number of fundamental contributions to science and society—in fact, along with electronics, it is a founding science of the current epoch of human history called the Information Age and a driver of the Information Revolution

The goal of the conference is to be a premier venue for researchers and industry practitioners to share new ideas, research results and development experiences in various fields. It is one of the best respected conferences in the area of computer science.

– Talks by industry experts on the state-of-the-art in computer science
– Lectures by eminent scientists designed to inspire and inform
– Presentations by innovative researchers coming from 50+ countries
– Discussion-oriented sessions and networking breaks to enable collaborations


The post Computing Conference appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

How Will #Quantum #Computing #Impact #Cyber Security?

Quantum computing is not an incremental improvement on existing computers
It’s an entirely new way of performing calculations, and can solve problems in a single step that would take traditional computers years or even longer to solve. While this power is great in a number of fields, it also makes certain types of computer security techniques trivial to solve. Here are a few of the ways quantum computing will affect cybersecurity and other fields.

Today’s Security
Cryptography powers many of today’s security systems. Although computers are great at solving mathematical problems, factoring especially large numbers can be effectively impossible for even the most powerful computers, with modern algorithms requiring decades or even longer to crack. The nature of quantum computing, however, means that cryptography based on factoring numbers will be effectively useless.

Fortunately, many cryptography approaches in use today are designed to be safe from quantum computers that haven’t yet been built. Business, governments agencies, and other entities that place a high priority on security don’t necessarily need to switch to quantum-safe approaches just yet, but it’s important that organizations are able to make the transition promptly should quantum computing technology develop faster than anticipated. It’s also worth noting that other forms of security won’t be affected by quantum computing. Two-factor authentication, for example, will be just as effective.

Tomorrow’s Security
The basics on quantum computing sound almost unbelievable, but they’re based on well-established science and mathematics. Modern computers rely on discrete values; a bit is either a 0 or a 1. Quantum computers, on the other hand, are able to store both of these possibilities simultaneously in what are called qubits, and the value only truly forms when it is observed.

Combined with the equally baffling concept of quantum entanglement, which allow qubits to be bound no matter how far away they’re located, and quantum computing can open the door to cryptography techniques that are theoretically unbreakable. No matter how much computing power is dedicated to solving quantum-based security implementations, they’ll still provide a safe conduit to send data through. With certain implementations, keys used to encrypt data will instantly stop working if anyone attempts to uncover them, leading to inherent security.

Quantum Arms Race
The ability to defeat common security implementations makes quantum computers a goal for intelligence agencies. Anticipating their eventually invention, many intelligence agencies are believed to be intercepting traffic that can’t yet be cracked but that may be vulnerable in the future if it can be decrypted. The first agencies to gain access to quantum computing power will have a substantial edge on their counterparts in other nations, and news of quantum computing success will spur further investment in other nations.

Unlike the development of weapons, however, there are also commercial and academic interests in quantum computers, so developing an arms treaty seems unlikely. Furthermore, non-government entities can likely gain access to quantum computers as well, presenting even more risk for compromising data. These threats underline the importance of ensuring new security measures are able to handle existing computers as well as potential quantum computers.

Who Will be the First?
The first intelligence agency with access to a quantum computer will gain a significant edge, and the first company with quantum computers for sale will stand to gain tremendously. Some of the names are long-time staples, including IBM, which has made slow but steady progress toward quantum computing over the years and expects major advances during the next decade. Another big name is Microsoft. We recently spoke to their senior technologist Rob Fraser about the transformative impact of quantum computing.

While other companies are attempting to build quantum computers, IBM seems most likely to be the first to succeed.

However, it’s important to appreciate the role academia is playing. The concept of quantum computing is built on quantum mechanical theory, a field where typical hardware engineers have no experience. Contributions to the field have come from academic institutes with a strong history in technology, including MIT and Harvard. The perplexing nature of quantum mechanics, which is difficult to comprehend even for the world’s leading researchers, means that development will always be largely based on theory and not just engineering.

What to Expect
Although quantum computing can perform some tasks impossible or impractical on standard computers, they may never replace the typical computer architecture we’re used to. Quantum computers in development now are incredibly sensitive, and there doesn’t seem to be an engineering solution to this sensitivity. Furthermore, the calculations quantum computers excel at aren’t especially useful for standard computer tasks.

However, quantum computing will lead to scientific advances that can benefit society at large. Furthermore, they may play a role for internet infrastructure, potentially improving performance. Although there may not be a quantum computer in every home, the impact of quantum computing will be substantial if, much like quantum mechanics itself, unpredictable.


The post How Will #Quantum #Computing #Impact #Cyber Security? appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

2018 IEEE International Conference on Big Data and Smart Computing (BigComp) (CFP Shanghai, China)

Source: National Cyber Security – Produced By Gregory Evans

General Cybersecurity Conference
January 15 – 17, 2018 | Shanghai, China

Cybersecurity Conference Description 

Big data and smart computing are emerging research fields that have recently drawn much attention from computer science and information technology as well as from social sciences and other disciplines.

The goal of the International Conference on Big Data and Smart Computing (BigComp), initiated by KIISE (Korean Institute of Information Scientists and Engineers), is to provide an international forum for exchanging ideas and information on current studies, challenges, research results, system developments, and practical experiences in these emerging fields.

Following the successes of the previous BigComp conferences in Bangkok, Thailand (2014), Jeju, Korea (2015), Hong Kong, China (2016), Jeju, Korea (2017), the 2018 International Conference on Big Data and Smart Computing (BigComp 2018) will be held in Shanghai, China.

The conference is co-sponsored by IEEE and KIISE. BigComp 2018 invites authors to submit original research papers and original work-in-progress reports on big data and smart computing.

Topic Areas

The topics of interest for BigComp2018 include (but are not limited to) the following:

• Techniques, models and algorithms for big data

• Machine learning and AI for big data

• Web search and information retrieval

• Models and tools for smart computing

• Cloud and grid computing for big data

• Security and privacy for big data

• Smart devices and hardware

• Big data applications: Bioinformatics, Multimedia, Smartphones, etc.

• Tools and systems for big data

• Data mining, graph mining and data science

• Infrastructure and platform for smart computing

• Big data analytics and social media

• Hardware/software infrastructure for big data

• Mobile communications and networks

• Smart location-based services

The post 2018 IEEE International Conference on Big Data and Smart Computing (BigComp) (CFP Shanghai, China) appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

How #quantum #computing could create #unbreakable #encryption and save the #future of #cybersecurity

Source: National Cyber Security – Produced By Gregory Evans

A new breakthrough in quantum computing may mean quantum key distribution (QKD) is on its way toward being a practical cybersecurity protocol.

Researchers at Duke University, The Ohio State University, and Oak Ridge National Laboratory have announced in the latest issue of Science Advances that they’ve increased the speed of QKD transmission by between five and 10 times the current rates.

Up until this latest breakthrough, which is delivering megabit/second rates, speeds were restricted to between tens to hundreds of kilobits a second.

What is quantum key distribution?

It sounds like something straight out of science fiction, but quantum key distribution is reality, and it could be protecting your data before you know it.

QKD uses photons—particles of light—to encode data in qubits, or quantum bits. The qubits are transmitted to a sender and recipient as an encryption key, and here’s where things get crazy: The transmission channels don’t need to be secure.

QKD’s whole purpose rests on quantum indeterminacy, which states that measuring something affects its original state. In the case of QKD, measuring photonic qubits affects their encoding, which allows the sender and recipient to immediately know if a hacker is trying to crack their quantum encryption key.

That means, theoretically at least, that QKD would be a perfect encryption: Any attempts to crack it would immediately be noticed and keys could be changed.

Making QKD practical for cybersecurity

The breakthrough made by the Duke research team came from being able to pack more data onto a single photon. The trick was learning to adjust the time at which the photon was released, along with adjusting the phase of the photon, causing it to be able to hold two bits of information instead of just one.

What makes the new system developed by the researchers even more amazing is that they were able to do it with nothing but commercially available telecommunication hardware, save the single-photon detector.

“With some engineering,” said Duke graduate student Nurul Taimur Islam, “we could probably fit the entire transmitter and receiver in a box as big as a computer CPU.”

Islam and his research partners say that hardware imperfections render their QKD system less than hack-proof, but their research continues to incorporate hardware shortcomings to make up for them.

“We wanted to identify every experimental flaw in the system, and include these flaws in the theory so that we could ensure our system is secure and there is no potential side-channel attack,” Islam said.

While it’s likely to take some time to emerge from the research phase and become a practical tool, this latest QKD breakthrough gives cybersecurity a leg up on cybercriminals.

As quantum computing becomes accessible, the likelihood of it being used to obliterate current forms of encryption increases, making the development of practical QKD essential. This should come as good news to anyone concerned about the current, and future, state of cybersecurity.

The post How #quantum #computing could create #unbreakable #encryption and save the #future of #cybersecurity appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Modern #Cybersecurity Totally Futile in #Quantum #Computing Era

Source: National Cyber Security – Produced By Gregory Evans

Modern #Cybersecurity Totally Futile in #Quantum #Computing Era

Quantum computing uses the power of atoms to perform memory and processing tasks and remains a theoretical concept. However, it is widely believed that its creation is possible. Most experts now agree that the creation of a quantum computer is simply a matter of engineering, and that the theoretical application will happen. Optimistic estimates for commercialization by the private sector vary between 5 and 15 years, while more conservative estimates by academics put it at 15-25 years.

The drive to create the first quantum computer has been viewed as the new arms race. The milestone to reach is that of quantum supremacy, essentially the performance of computation that goes beyond the capability of the latest and best supercomputers in existence today. But this drive is underpinning another, more pressing race: quantum cybersecurity.

ABI Research, the leader in emerging technology intelligence, forecasts that the first attack-capable quantum machines will make their market debut by 2030. Michela Menting, Research Director at ABI Research warns, “When they do, even the latest and best in class cybersecurity technologies will be vulnerable.”

The race to quantum supremacy is real: governmental R&D is accelerating the crystallization of the quantum computer, with more than US$1.6 billion already invested globally. The potentially drastic repercussions on cybersecurity is equally real and has led to the focus on quantum-safe cryptography. Also known as post quantum cryptography, such research looks to the development of new cryptographic algorithms that could withstand breaking by quantum computers, ideally before such computers become commercially available. Standards agencies the world over, including the NIST and ETSI, are focusing their efforts on developing appropriate standards as time grows increasingly shorter.

Beyond and ahead of quantum computers, the use of the theory has also aided in developing new cryptographic techniques, notably quantum key distribution (QKD). Considered as a type of quantum-safe cryptography, QKD will likely be commercialized before the advent of quantum computers, because it is achievable using current technologies such as lasers and fiber optics. In that sense, QKD is one of the first quantum theories to find real-world applications.

Heavy private sector investment is going into quantum R&D. Since 2012, VC funds have pumped over US$334 million into companies specializing in the space. Those standing out in the space include CipherQ, CryptaLabs, CryptoExperts, ID Quantique, ISARA, MagiQ Technologies, Post-Quantum Solutions, Qubitekk, QuintessenceLabs, QuNu Labs, and SecureRF.

“The transition to quantum resistant cryptography is bound to take time but enterprises should already start considering how to address this future security gap in in their risk assessments and pay attention to both standard developments and market solutions,” Menting concludes.


The post Modern #Cybersecurity Totally Futile in #Quantum #Computing Era appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hackers Use Amazon’s AWS Computing Resources to Mine Bitcoin

Source: National Cyber Security – Produced By Gregory Evans

Security intelligence group RedLock has exposed hackers who were using Amazon Web Services (AWS) computing resources to mine bitcoin. In a report from the intelligence company it found that at least two companies were targeted: Aviva and Gemalto, both multinational corporations. RedLock were alerted to the situation after realizing that…

The post Hackers Use Amazon’s AWS Computing Resources to Mine Bitcoin appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures