Cybersecurity and quantum readiness
Avast CISO Jaya Baloo explains what quantum computing is, talks about its promises and potential pitfalls, and urges organizations to be pragmatic about preparing for its advent. She lays out the steps that can be taken immediately and those that can.....»»
Analysis of heterostructures for spintronics shows how two desired quantum-physical effects reinforce each other
Spintronics uses the spins of electrons to perform logic operations or store information. Ideally, spintronic devices could operate faster and more energy-efficiently than conventional semiconductor devices. However, it is still difficult to create a.....»»
Striking the balance between cybersecurity and operational efficiency
In this Help, Net Security interview, Michael Oberlaender, ex-CISO, and book author, discusses how to strike the right balance between security and operational efficiency. Oberlaender advises companies starting their cybersecurity journey and stresse.....»»
Could interstellar quantum communications involve Earth or solve the Fermi paradox?
Thus far, the search for extraterrestrial intelligence (SETI) has used strategies based on classical science—listening for radio waves, telescopes watching for optical signals, telescopes in orbit scouring light from the atmospheres of exoplanets,.....»»
Were Bohr and von Neumann really in conflict over quantum measurements?
Analysis suggests that the two pioneers of quantum mechanics, Niels Bohr and John von Neumann, may have had more similar views than previously thought regarding the nature of quantum systems, and the classical apparatus used to measure them......»»
Essential metrics for effective security program assessment
In this Help Net Security interview, Alex Spivakovsky, VP of Research & Cybersecurity at Pentera, discusses essential metrics for evaluating the success of security programs. Spivakovsky explains how automation and proactive testing can reveal vulner.....»»
LHC experiments observe quantum entanglement at the highest energy yet
Quantum entanglement is a fascinating feature of quantum physics—the theory of the very small. If two particles are quantum-entangled, the state of one particle is tied to that of the other, no matter how far apart the particles are. This mind-bend.....»»
Quantum ‘Ghost Imaging’ Reveals the Dark Side of Plants
Entanglement lets researchers watch plants in action without disruptive visible light.....»»
Hydden raises $4.4 million to improve identity security
Hydden announced that it has closed $4.4 million in seed funding led by Access Venture Partners. Other investors include Lockstep, the venture fund of CISOs Rinki Sethi and Lucas Moody, Service Provider Capital, and several cybersecurity angel invest.....»»
Verimatrix XTD Network Monitoring provides real-time detection of malicious activities
Verimatrix intoduced its Verimatrix XTD Network Monitoring feature, expanding its suite of application cybersecurity solutions to combat evolving network-related threats. Verimatrix XTD has long been at the forefront of identifying and neutralizing m.....»»
TCL accused of selling quantum dot TVs without actual quantum dots
Would such a scam really be worth it? Enlarge / TCL's C655 Pro TV is advertised as a quantum dot Mini LED TV. (credit: TCL) TCL has come under scrutiny this month after testing that claimed to examine three TCL TVs mark.....»»
The ripple effects of regulatory actions on CISO reporting
In this Help Net Security video, Sara Behar, Content Manager at YL Ventures, discusses how recent regulatory actions and high-profile legal incidents involving cybersecurity leaders have influenced CISO reporting. In a recent report of the CISO Circu.....»»
This Pixel Watch 3 feature is now coming to older Fitbits
After debuting on the Pixel Watch 3, Fitbit's new Daily Readiness score is now coming to older watches and Fitbit trackers......»»
Energy transmission in quantum field theory requires information: Research finds surprisingly simple relationship
An international team of researchers has found a surprisingly simple relationship between the rates of energy and information transmission across an interface connecting two quantum field theories. Their work was published in Physical Review Letters.....»»
Making "atomic lasagna": New method transforms 3D materials into stable layered thin films with promising properties
A research team discovered a method to transform materials with three-dimensional atomic structures into nearly two-dimensional structures—a promising advancement in controlling their properties for chemical, quantum, and semiconducting application.....»»
Hackers claim 440GB of user data breached from large cybersecurity company
Hackers take 440GB of user data from one of the largest cybersecurity companies and post it to a hacking forum......»»
Floquet engineering tunes ultracold molecule interactions and produces two-axis twisting dynamics
The interactions between quantum spins underlie some of the universe's most interesting phenomena, such as superconductors and magnets. However, physicists have difficulty engineering controllable systems in the lab that replicate these interactions......»»
Top priorities for federal cybersecurity: Infrastructure, zero trust, and AI-driven defense
In this Help Net Security, Erica Banks, VP and a leader in Booz Allen’s civilian services business, discusses the Federal Cybersecurity Strategy’s role in safeguarding national assets. Banks outlines key areas for improvement, including funding,.....»»
Internal disconnects vs. cybersecurity: How connectivity shapes challenges
Concerns about the trustworthiness of internal data exist in nearly all organizations globally, according to TeamViewer. 99% of business leaders pointed to factors undermining trust in internal data, citing multiple versions of the truth (38%), confl.....»»
Benefits and best practices of leveraging AI for cybersecurity
AI has become a key player in protecting valuable organizational insights from threats. Thanks to AI-enabled data protection practices such as behavior monitoring, enterprises no longer have to be reactive to a cyberattack but can be proactive before.....»»
As quantum computing threats loom, Microsoft updates its core crypto library
Two algorithms added so far, two more planned in the coming months. Enlarge (credit: Getty Images) Microsoft has updated a key cryptographic library with two new encryption algorithms designed to withstand attacks from q.....»»