POPULARITY
Yale's Steve Girvin is a pioneer of quantum computing, and our guide for our first foray into understanding how these systems do and don't work. Over the course of our conversation, we come to realize that quantum computers are not performing computations per se - they're more devices that an be used to answer a specific set of questions about reality. We dig into the details of why some questions can only be answered with a quantum computer, how next generation encryption services will come with a way of detecting eavesdroppers, and try once more to understand if there's a way of looking at the Stern Gerlach experiment that doesn't need any kind of magic. PATREON: get episodes early + join our weekly Patron Chat https://bit.ly/3lcAasB MERCH: Rock some DemystifySci gear : https://demystifysci.myspreadshop.com/ AMAZON: Do your shopping through this link: https://amzn.to/3YyoT98 SUBSTACK: https://substack.com/@UCqV4_7i9h1_V7hY48eZZSLw@demystifysci Further Reading: Stern-Gerlach "Quantization of Silver Atoms in Magnetic Field": https://arxiv.org/pdf/2301.11343 Stern-Gerlach Wiki: https://en.wikipedia.org/wiki/Stern%E2%80%93Gerlach_experiment C2QA Center: https://www.bnl.gov/quantumcenter/newsletter/news.php?a=219066 (00:00) Go! (00:06:46) Basics of Quantum Mechanics (00:14:00) Quantum Computing Challenges and Benefits (00:22:02) Quantum Computer as an Accelerator (00:34:21) Integration of Quantum and Classical Systems (00:37:01) Quantum Encryption and Security (00:41:55) Limits and Future of Quantum Computing (00:54:12) Understanding Qubits vs Classical Bits (01:03:39) Quantum Measurement Asymmetry (01:09:10) Stern-Gerlach Experiment and Qubits (01:21:12) Quantum Spin and Measurement Effects (01:29:27) The Genetic Fields Analogy (01:37:07) Visualizing Quantum Phenomena (01:46:08) Quantum Error Correction Techniques (01:57:31) Alternative Quantum Computing Methods (02:09:03) Future Applications and Challenges (02:17:13) Scaling and Fault Tolerance in Quantum Computing (02:30:20) Bridging Quantum and Classical Computing (02:36:01) Co-design and Abstraction Layers #QuantumComputing, #QuantumMechanics, #QuantumPhysics, #Qubits, #QuantumEncryption, #QuantumAlgorithms, #QuantumTechnology, #QuantumComputer, #QuantumEntanglement, #QuantumErrorCorrection, #SuperconductingCircuits, #QuantumVsClassical, #FutureOfComputing, #QuantumSimulation, #QuantumRevolution, #Computing, #Physics, #Technology, #Science, #STEM, #sciencepodcast, #longformpodcast Check our short-films channel, @DemystifySci: https://www.youtube.com/c/DemystifyingScience AND our material science investigations of atomics, @MaterialAtomics https://www.youtube.com/@MaterialAtomics Join our mailing list https://bit.ly/3v3kz2S PODCAST INFO: Anastasia completed her PhD studying bioelectricity at Columbia University. When not talking to brilliant people or making movies, she spends her time painting, reading, and guiding backcountry excursions. Shilo also did his PhD at Columbia studying the elastic properties of molecular water. When he's not in the film studio, he's exploring sound in music. They are both freelance professors at various universities. - Blog: http://DemystifySci.com/blog - RSS: https://anchor.fm/s/2be66934/podcast/rss - Donate: https://bit.ly/3wkPqaD - Swag: https://bit.ly/2PXdC2y SOCIAL: - Discord: https://discord.gg/MJzKT8CQub - Facebook: https://www.facebook.com/groups/DemystifySci - Instagram: https://www.instagram.com/DemystifySci/ - Twitter: https://twitter.com/DemystifySci MUSIC: -Shilo Delay: https://g.co/kgs/oty671
CyberIntel - Talking Cybersecurity and Compliance (Presented by VikingCloud)
In this episode of CyberIntel, Brian Odian discusses the latest on NIST's work towards post-quantum encryption. If you have any questions you want answered on CyberIntel, email us at cyberintel@vikingcloud.com and our experts will be in touch - we may even make it the subject of a future episode! CyberIntel provides a deep dive into the world of cybersecurity and compliance. Hosted by Brian Odian, VikingCloud's Director of Managed Compliance Services APAC, amongst other cybersecurity and compliance expert advisors, we explore the nuances of various compliance standards and the latest in cybersecurity news, trends and threats. New episodes every two weeks! CyberIntel is presented by VikingCloud. VikingCloud is leading the Predict-to-Prevent cybersecurity and compliance company, offering businesses a single, integrated solution to make informed, predictive, and cost-effective risk mitigation decisions - faster. VikingCloud is the one-stop partner trusted by 4+ million customers every day to provide the predictive intelligence and competitive edge they need to stay one step ahead of cybersecurity and compliance disruption to their business.
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com When it comes to preparing for a hurricane, the federal government has FEMA, NOAA, and a wide range of recovery options. However, we all know quantum is coming down the road, and many are not prepared for what will come. And it will come. We do not know when. Serious scholars have posited that future quantum computers will be able to break our current encryption. What is quantum encryption? You can go to YouTube and be impressed with the advanced mathematics involved in quantum. The basic idea is that someday in the future, specialized computers will be able to crack today's encryption. During the interview, experts from Tyto Athene discuss prevention and elaborate on a concept called Post Quantum Encryption. Some parts of the federal government take this concept seriously. NIST has considered some options and is offering some tests. Richard Wheeler gives a detailed description of the NIST initiatives. One may ask, why worry now? This is because nation-states are vacuuming up and storing data. As for now, they cannot decrypt it. However, they may be able to in the future. Personal information and federal secrets will have value somewhere down the road.
Starting with quantum-resilient encryption support for the Linux application, NordVPN aims to implement post-quantum cryptography for all applications. NordVPN, a leading cybersecurity company, launches its first VPN application with quantum-resilient encryption. The first iteration of post-quantum cryptography support for NordLynx is now available on the NordVPN Linux application. Additionally, the company plans to implement post-quantum algorithms on all NordVPN applications by 2025 Q1 at the latest. "Trends show that cybercriminals are intensifying what are known as 'harvest now, decrypt later' attacks. Simply put, they are trying to accumulate huge quantities of encrypted data and decrypt them once quantum technology is developed. Thus, the VPN industry must enter a new phase of development to defend against future quantum computing threats. With this launch, we start a major transition to new generation encryption of all our applications, providing long-term security for our users," says Marijus Briedis, CTO at NordVPN. The recent announcement by NIST regarding the first post-quantum cryptographic standards is significant for the VPN industry as it signals the beginning of a necessary transition to quantum-resistant encryption methods. VPNs rely heavily on cryptographic protocols for securing communication, so the industry must now prepare to adopt these new standards to ensure long-term security against future quantum computer threats. The rollout of the NordVPN Linux application with the first iteration of post-quantum cryptography will allow the company's team of engineers to gather essential performance data, including its impact on connection times and speeds. Based on these insights, NordVPN aims to extend post-quantum cryptography support to all of their applications by 2025 Q1 at the latest. Implementing post-quantum encryption in a VPN presents technical challenges. While security remains paramount, ensuring that post-quantum algorithms are performant enough for real-world deployment is equally critical. These algorithms typically require much larger key sizes and signatures than traditional ones, leading to increased computational overhead, which can negatively impact VPN speed and performance, particularly in high-throughput environments. "These technical challenges are the reason for the gradual implementation of post-quantum cryptography support to our applications. We want to be completely sure that we will keep the highest level of user experience in terms of connection time and speed during the transition," Briedis says. Moreover, NordVPN aims to ensure that applications are both quantum-resistant and agile in cryptographic management. As cryptographic needs evolve, the demand for crypto-agility that enables systems to adapt to new cryptographic standards seamlessly will be essential.
The podcast episode discusses the need for stronger encryption standards to protect against the threat of quantum computers. The Department of Defense and NIST are working on developing new encryption standards to safeguard sensitive information. IBM is leading the way in developing quantum-resistant encryption algorithms. The current administration is taking cybersecurity seriously and actively implementing measures to protect digital information. The podcast also touches on the rapid advancement of technology and the need for organizations to stay ahead of the curve. Article: Safeguarding U.S. secrets from quantum computers just got easier https://www.axios.com/2024/08/13/nist-post-quantum-cryptography-encryption?fbclid=IwY2xjawEx3fpleHRuA2FlbQIxMAABHT3y9TPwrpTppNOz7wbsnBtByi_z17wzTp2tGCCsNkrxqlhAQFwAqu8D7g_aem_CA0jb1acqnuksrLDO0EGtA Please LISTEN
Send us a Text Message.Dr. Raj Yavatkar, Ph.D. is Chief Technology Officer at Juniper Networks ( https://www.juniper.net/us/en/the-feed/topics/raj-yavatkar.html ), where he has responsibility for charting the company's technology strategy, leading and executing the company's critical innovations and products for intelligent self-driving networks, security, Mobile Edge Cloud, network virtualization, packet-optical integration, and hybrid cloud. A technology and products pioneer throughout his career, Dr. Yavatkar has envisioned how emerging technologies can be applied to creatively solve enterprise and business problems ahead of competitors to help establish new product lines. Before joining Juniper, Dr. Yavatkar was at Google (GCP), where he led a large team of engineers to deliver cloud networking infrastructure and products for Google Cloud customers. Prior to that at VMware, he ideated a new product concept to address the private/hybrid cloud markets by defining VMware Cloud Foundation—an easy way to deploy and manage virtual clouds—leading a large product team to successfully deliver product to market. He started his career at Intel, rising to the position of Intel Fellow, a position he held for 10 years. During his various leadership roles there, Dr. Yavatkar was responsible for driving new product and R&D initiatives in many areas of software. He brings a wealth of experience in emerging technologies. He has been awarded more than 45 patents, published over 60 research papers, authored 5 Internet standards, and co-authored a book on internet quality of service. He is an IEEE Fellow and holds a PhD in Computer Science from Purdue University. Support the Show.
Useful quantum computers aren't a reality—yet. But in one of the biggest deployments of post-quantum encryption so far, Apple is bringing the technology to iMessage. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoices
In Episode 79, Patrick and Ciprian talk about Post-Quantum Encryption.A fascinating discussion about asymmetric encryption, NIST post-quantum cryptography standardization, and CRYSTALS - the Cryptographic Suite for Algebraic Lattices.
JB ‘Jor-El' Benjamin, is the Founder of Kryotech. JB isn't your run-of-the-mill developer; he's a tech maverick reshaping the digital landscape. JB brings a unique perspective to the forefront. He is a tech pioneer who has created the world's first post-quantum encrypted messenger Vox Messenger, and the unprecedented group transaction crypto wallet, Vox Crypto. While his technical acumen covers a vast spectrum, from meticulous UI/UX design to cutting-edge cryptography, JB's true brilliance lies in his ability to communicate intricate workflows with both technical and non-technical audiences. Stop paying health insurance companies your hard-earned dollars. Go to Join Crowd Health now and experience freedom from health insurance. Right now you can get your first six months for just $99 per month. That's almost 50% off the normal price, and a lot less than a high-deductible healthcare plan. Go to Join Crowd Health and use promo code LIONS at sign-up. Subscribe to John's Finding Freedom Show solo feed. Listen and Subscribe on Apple Podcasts and Spotify. Get access to all of our bonus audio content, livestreams, behind-the-scenes segments and more for as little as $5 per month by joining the Lions of Liberty Pride on Patreon OR support us on Locals! Check out our merchandise at the Lions of Liberty Store for all of our awesome t-shirts, mugs and hats! Learn more about your ad choices. Visit megaphone.fm/adchoices
JB ‘Jor-El' Benjamin, is the Founder of Kryotech. JB isn't your run-of-the-mill developer; he's a tech maverick reshaping the digital landscape. JB brings a unique perspective to the forefront. He is a tech pioneer who has created the world's first post-quantum encrypted messenger Vox Messenger, and the unprecedented group transaction crypto wallet, Vox Crypto. While his technical acumen covers a vast spectrum, from meticulous UI/UX design to cutting-edge cryptography, JB's true brilliance lies in his ability to communicate intricate workflows with both technical and non-technical audiences. Stop paying health insurance companies your hard-earned dollars. Go to Join Crowd Health now and experience freedom from health insurance. Right now you can get your first six months for just $99 per month. That's almost 50% off the normal price, and a lot less than a high-deductible healthcare plan. Go to Join Crowd Health and use promo code LIONS at sign-up. Subscribe to John's Finding Freedom Show solo feed. Listen and Subscribe on Apple Podcasts and Spotify. Get access to all of our bonus audio content, livestreams, behind-the-scenes segments and more for as little as $5 per month by joining the Lions of Liberty Pride on Patreon OR support us on Locals! Check out our merchandise at the Lions of Liberty Store for all of our awesome t-shirts, mugs and hats! Learn more about your ad choices. Visit megaphone.fm/adchoices
JB ‘Jor-El' Benjamin, is the Founder of Kryotech. JB isn't your run-of-the-mill developer; he's a tech maverick reshaping the digital landscape. JB brings a unique perspective to the forefront. He is a tech pioneer who has created the world's first post-quantum encrypted messenger Vox Messenger, and the unprecedented group transaction crypto wallet, Vox Crypto. While his technical acumen covers a vast spectrum, from meticulous UI/UX design to cutting-edge cryptography, JB's true brilliance lies in his ability to communicate intricate workflows with both technical and non-technical audiences. Stop paying health insurance companies your hard-earned dollars. Go to Join Crowd Health now and experience freedom from health insurance. Right now you can get your first six months for just $99 per month. That's almost 50% off the normal price, and a lot less than a high-deductible healthcare plan. Go to Join Crowd Health and use promo code LIONS at sign-up. Subscribe to John's Finding Freedom Show solo feed. Listen and Subscribe on Apple Podcasts and Spotify. Get access to all of our bonus audio content, livestreams, behind-the-scenes segments and more for as little as $5 per month by joining the Lions of Liberty Pride on Patreon OR support us on Locals! Check out our merchandise at the Lions of Liberty Store for all of our awesome t-shirts, mugs and hats! Learn more about your ad choices. Visit megaphone.fm/adchoices
On this week's Technology Report, David “Kumo” Kumashiro and Simon “Rocky” Rochelle of the innovative British quantum encryption company Arqit discuss the importance of working to apply quantum encryption of data today to safeguard critical information from future threats as both friends and foes race to field game-changing quantum computers able to crack any message not protected by quantum technologies with Defense & Aerospace Report Editor Vago Muradian.
Ramy Shelbaya, the co-founder and CEO of Quantum Dice, is interviewed by Yuval Boger. Ramy and I discuss their encryption key generation approach using quantum technology, randomness self-verification, how their technology interfaces with cybersecurity products, the potential for keys on the cloud, and much more.
Denis Mandich, CTO of Qrypt, a post-quantum encryption systems company, is interviewed by Yuval Boger. Denis and Yuval talk about Qrypt's unique approach to security that replaces key distribution with key generation at the endpoints, implemented via software, how their solution works for air-gapped devices, their price structure, the human right to privacy, and much more.
On Today's Show: "I mean, we're basically looking at the transistor revolution (...) that took computers from the size of rooms to something you can put in your pocket. It's that kind of, you discover new technology, you apply it everywhere and see what you can do." - Elizabeth IwasawaA new frontier for technology is upon us. Quantum Technology is utilizing the fascinating world of quantum physics to revolutionize technology. The practical applications are abundant, and cybersecurity is one of the biggest sectors that stands to gain from this progression. The technology is already in use for quantum encryption, quantum computers, and more. Elizabeth Iwasawa is Leidos' Quantum Technology Lead and a Research Scientist. She joins to explain what Quantum Technology is, why it's revolutionary, and what it means for the future of cybersecurity.Key Takeaways:What Quantum Technology is and how it's differentHow Cybersecurity will be revolutionized by Quantum TechnologyHow it will change the future of computing
Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)
701: In a panel discussion from our September Metis Strategy Digital Symposium, Kevin Stine, the Chief of Applied Cybersecurity Division at the National Institute of Standards and Technology's Information Technology Laboratory, discusses the evolution of the cybersecurity landscape and the frameworks being adopted to manage this risk. Kevin talks specifically about the NIST Cybersecurity Framework, the new update the organization rolled out recently, and why global alignment is important to help US businesses remain competitive in global markets. Finally, he also talks about the future of cybersecurity, how companies are implementing better risk-management measurement capabilities, and why the introduction of quantum computing can pose a real threat to organizations.
Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)
701: In a panel discussion from our September Metis Strategy Digital Symposium, Kevin Stine, the Chief of Applied Cybersecurity Division at the National Institute of Standards and Technology's Information Technology Laboratory, discusses the evolution of the cybersecurity landscape and the frameworks being adopted to manage this risk. Kevin talks specifically about the NIST Cybersecurity Framework, the new update the organization rolled out recently, and why global alignment is important to help US businesses remain competitive in global markets. Finally, he also talks about the future of cybersecurity, how companies are implementing better risk-management measurement capabilities, and why the introduction of quantum computing can pose a real threat to organizations.
Roger Grimes is an industry expert and the Data Driven Defense Evangelist for KnowBe4. In this episode, Roger and host Hillarie McClure discuss how a post-quantum encryption contender was taken out by a single-core PC in one hour, where this leaves us with post-quantum encryption, and more. KnowBe4 is the world's first and largest New-school security awareness training and simulated phishing provider that helps you manage the ongoing problem of social engineering. To learn more about our sponsor, KnowBe4, visit https://knowbe4.com
Confluence Backdoor, MFA bypassing, Quantum Encryption broken, Privacy bill Cybersecurity News CyberHub Podcast August 4th, 2022 Today's Headlines and the latest #cybernews from the desk of the #CISO: VirusTotal Data Shows How Malware Distribution Leverages Legitimate Sites, Apps Hackers Exploited Atlassian Confluence Bug to Deploy Ljl Backdoor for EspionageMicrosoft accounts targeted with new MFA-bypassing phishing kit Single-Core CPU Cracked Post-Quantum Encryption Candidate Algorithm in Just an Hour U.S. Cyberspace Ambassador nominee lays out ambitious agenda Corporate lobbying could imperil sweeping data privacy bill Story Links: https://www.securityweek.com/virustotal-data-shows-how-malware-distribution-leverages-legitimate-sites-apps https://thehackernews.com/2022/08/hackers-exploited-atlassian-confluence.html https://www.bleepingcomputer.com/news/security/microsoft-accounts-targeted-with-new-mfa-bypassing-phishing-kit/ https://thehackernews.com/2022/08/single-core-cpu-cracked-post-quantum.html https://therecord.media/u-s-cyberspace-ambassador-nominee-lays-out-ambitious-agenda/ https://thehill.com/business-a-lobbying/3585322-corporate-lobbying-could-imperil-sweeping-data-privacy-bill/ “The Microsoft Doctrine” by James Azar now on Substack https://jamesazar.substack.com/p/the-microsoft-doctrine The Practitioner Brief is sponsored by: Your BRAND here - Contact us for opportunities today! ****** Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Digital Debate, and Other Side of Cyber James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/ Telegram: CyberHub Podcast ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter ****** Website: https://www.cyberhubpodcast.com Youtube: https://www.youtube.com/c/TheCyberHubPodcast Rumble: https://rumble.com/c/c-1353861 s Facebook: https://www.facebook.com/CyberHubpodcast/ Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ Twitter: https://twitter.com/cyberhubpodcast Instagram: https://www.instagram.com/cyberhubpodcast Listen here: https://linktr.ee/cyberhubpodcast The Hub of the Infosec Community. Our mission is to provide substantive and quality content that's more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. Thank you for watching and Please Don't forget to Like this video and Subscribe to my Channel! #cybernews #infosec #cybersecurity #cyberhubpodcast #practitionerbrief #cisotalk #ciso #infosecnews #infosec #infosecurity #cybersecuritytips #podcast #technews #tinkertribe #givingback #securitytribe #securitygang #informationsecurity
In this episode of Cyber Security Inside What That Means, Camille dives into next generation cryptography and quantum computing with Eddy Zervigon, CEO of Quantum Xchange and Independent Board Member. The conversation covers: - The new era of cryptography due to the advancement of quantum computing. - How two-factor authentication and the idea behind it is one solution to making things more secure. - How satellites pose particular challenges but are also incredibly important to secure. - What thought leaders are doing now and where we are headed in this field. ...and more. Don't miss it! The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation. Here are some key takeaways: - We are about to have a huge cryptographic migration due to quantum computing and advanced computing. This is because for a long time we've used basic math to encrypt data, and computers are now starting to be able to do the math to break the encryption. - We are entering the post-quantum era, and we will need to develop new security protocols and security measures. If we don't adapt, there could be catastrophic losses. - There are two main approaches to solving this problem. The first is factoring a very large number into its two prime numbers using algorithms. Computers aren't very good at that. - The second is called quantum key distribution, which uses physics and photonic delivery. This is expensive and hard to scale, but work is being done to incorporate both of these tools into security moving forward. - There are now multiple points of communication between devices. Previously, there was only one communication line, so both the data and the encryption key had to travel together. Now, with wifi, cell access, and access through many apps, there are multiple paths to send data through to make it more secure. - To protect a series of data transmissions, they are now essentially trying to use a two-factor authentication type of technology, where it is an out-of-band key. - One of the problems with satellites is that once it leaves Earth you can't send a repairman to go fix it. Because of this, needing to future-proof satellites has become important. Especially with the increasing number of satellites being launched each year and the decreased cost to do so. - It's important to not only protect the information coming to and from the satellites, but also to protect control of the satellites themselves. Not only to protect imaging and communication, but also to make sure the satellite stays in its orbit and in its path. - This quantum computing is also prevalent in government and financial institutions, which is why so much research is being done. There are also some real safety concerns with how much technology has been integrated into our infrastructure. - Killware is the new ransomware that is focused not on extracting money or compensation, but is focused on actually destroying the resources that are being attacked. - The new Executive Order that came out about next generation cryptography is going to strongly encourage government agencies to invest in and find out how to use this to protect data. There are not currently any penalties for not doing so, but those will come. - This is because many of what we now consider normal technology, such as two-factor authentication, were first introduced as government protections. - Bad hackers are collecting information right now, even though they can't decrypt it, to learn from it and to potentially decrypt it in the future when they have the capability to do so. The problem is happening now, even if it hasn't fully come to fruition yet. - Quantum threat assessment is something that is happening now, to develop a threat matrix and identify your largest vulnerabilities. Tracing where your data is and where you lose control of it is important right now. In this moment, finding people who are willing to be a leader in this area is also important, since in two to three years this will be a necessity, not a differentiator. - Of course, performance degradation is an issue as well, and plays a key role in this research and development. The cost of transmitting the key can't be too high. Some interesting quotes from today's episode: “It's basically, let's encrypt the data with math that's very hard to break. And the good news is that for 45 years we've done a better job of encrypting than the bad guys have done with their ability to decrypt that information. So it's been an extraordinary run, but now we're coming to a point where computers are able to do exactly that very calculation, easily and efficiently.” - Eddy Zervigon “Now, if you look at even your cell phone, you've got wifi, and you've got your cell access, and multiple points of carriage - through your WhatsApp account, or your signal, or your Netflix account. So there are multiple paths, so why are we not incorporating the fact that we can now deliver multiple paths to separate the key from the data and make it that much harder for an attacker to be able to successfully decrypt information?” - Eddy Zervigon “It's basically two-factor authentication for encryption keys. I remember five years ago two-factor authentication was really cool stuff that you would do when you were trying to send a wire for $50,000. Now you can't even buy concert tickets without two-factor authentication.” - Eddy Zervigon “It's important to protect it, not only as it relates to the telemetry tracking and control… but also the data coming onto the satellite and coming off of the satellite. That's important because you're talking about 4,200 commercial satellites up there, and that's growing at about 20% a year.” - Eddy Zervigon “If you think about it, the ability to deliver an out-of-band key anywhere in the world, especially as you're talking about military and intelligence applications, is incredibly important. Especially in light of these oncoming advancements in computing.” - Eddy Zervigon “Energy is one that's extremely important, because that's where you'll see real, what we call killware, which is the next generation of ransomware. We've seen with the Colonial Pipeline what we could basically call a rudimentary attack can do and the ill effects that come from it.” - Eddy Zervigon “One thing that we've seen as a result of the pandemic, is that we are extending the range of what is reasonably acceptable in terms of the edge of computing, and being able to access network controls - significant, important network access controls. That's all great, but that comes at a cost.” - Eddy Zervigon “‘Out of band' means over a separate channel… If I'm in my bank account on the internet and I'm trying to wire my brother $15,000, and all of the sudden I'm going to get a token on my cell phone, a completely different communication - it's a cell communication of the token that I now have to input into that. It's the same concept.” - Eddy Zervigon
Quantum Computing is a fascinating and revolutionary technology that has been gaining significant ground in the past decade, with researchers from both academia and the commercial sector - such as Google and IBM - announcing major breakthroughs every few weeks. Mike Redding, CTO of Quantropi, a company specializing in Quantum Encryption - claims that this revolution is even closer than most of us think.
Quantum physics is a mystery to most everyone, but that doesn't stop innovators from attempting to apply quantum technologies at a practical level -- in this case, cybersecurity.
Vetle (@bordplate), Martin (@mrtn9) and René (@ParticleVoid) are hosting the BSides Oslo Digital Edition intermission by talking about the talks they saw and more!
This episode features world renowned UC Berkeley crypto researcher ( PhD UCLA 2013, IIT Delhi 2008, Forbes 30 Under 30 list 2016 ) Dr Sanjam Garg.Sanjam was featured on Forbes 30 Under 30 list (2016) for his pioneering research on ways to create ‘unhackable’ software.His ground breaking work in software obfuscation has enabled a range of new cybersecurity applications many of which were previously considered impossible. Quanta Magazine referred to Dr Sanjam's work as a watershed moment for cryptography. Read more about his publications here .Sponsors : Zencastr.com is the perfect cloud based solution to record your remote interviews in studio quality format with just a few clicks . Listen to Rob Braxman the real Internet Privacy Guy, on how to protect your privacy online . Visit his YouTube channel at Rob Braxman Tech.
George Gilder and Robert J. Marks discuss blockchain, Bitcoin, quantum and carbon computing, and George Gilder’s new book Gaming AI: Why AI Can’t Think but Can Transform Jobs (which you can get for free here). Show Notes 00:26 | Introducing George Gilder 01:00 | Blockchain 07:57 | Facial recognition 10:30 | Bitcoin 15:04 | Quantum computing 18:16 | Carbon computing… Source
George Gilder and Robert J. Marks discuss blockchain, Bitcoin, quantum and carbon computing, and George Gilder’s new book Gaming AI: Why AI Can’t Think but Can Transform Jobs (which you can get for free here). Show Notes 00:26 | Introducing George Gilder 01:00 | Blockchain 07:57 | Facial recognition 10:30 | Bitcoin 15:04 | Quantum computing 18:16 | Carbon computing… Source
This week on the Future Design Podcast we chat with Leslie Maliepaard, CEO of The Planet Calls, on the pressing issue of Climate Change and more essentially, the Plastic Crisis. With new economical models of thinking such as the Circular Economy, can foundational pillars of these systems help us to re-think how we handle Climate Change? Here are a few episode highlights:The Linear vs Circular Economy.The false advertising of Recycling: Why it doesn’t really work.Is money involved in the Circular Economy system?How can we make a difference as consumers and encourage our governments to do the same? Leslie has a background in building and leading tech, financial, and SaaS startups in Europe and Africa for the past 20 years. Her current passion projects include Circular Economy, Clean Water, and Sustainability. She has sat on a number of different advisory boards in the past, in Quantum Encryption, SaaS sectors as well as the World Business Angel Forum Global Women Leaders Committee.She has also co-founded Fortrino, a consulting company that advises and invests in late-stage / growth companies in Cyber Security, Data Privacy, Social and Impact sectors (post-seed in Europe), and The Planet Calls Foundation. The latter aims to progress the ‘sustainable future’ movement and boost the resilience of companies. They work with companies and many other dimensions of sustainability, building a more sustainable future TOGETHER.Check out their YouTube documentary called "The Planet Calls" here.Subscribe to our Monthly Newsletter here Guest: Leslie Maliepaard (LinkedIn) Host: Takatoshi Shibayama (Twitter | IG | LinkedIn) Music: ShowNing (Website)
Dr. Shohini Ghose, professor of physics and computer science and founding director of the Center for Women in Science at Wilfred Laurier University, explains to Tonya Hall how quantum is being used to solve the quantum encryption threat. FOLLOW US - Subscribe to ZDNet on YouTube: http://bit.ly/2HzQmyf - Watch more ZDNet videos: http://zd.net/2Hzw9Zy - Follow ZDNet on Twitter: https://twitter.com/ZDNet - Follow ZDNet on Facebook: https://www.facebook.com/ZDNet - Follow ZDNet on Instagram: https://www.instagram.com/ZDNet_CBSi - Follow ZDNet on LinkedIn: https://www.linkedin.com/company/ZDNe... - Follow ZDNet on Snapchat: https://www.snapchat.com/add/zdnet_cbsi Learn more about your ad choices. Visit megaphone.fm/adchoices
Herbert Fotso is an assistant professor of physics in UAlbany's College of Arts and Sciences. His research focuses on theoretical and computational condensed matter physics. In this episode, Herbert gives insight on the global arms race in quantum computing, and where the U.S. stands in the competition to create the world's next quantum computer. Learn more about Herbert's research. The UAlbany News Podcast is hosted and produced by Sarah O'Carroll, a Communications Specialist at the University at Albany, State University of New York, with production assistance by Patrick Dodson and Scott Freedman.Have a comment or question about one of our episodes? You can email us at mediarelations@albany.edu, and you can find us on Twitter @UAlbanyNews.
Global arms sales on the rise and Canada invests in quantum technology In this episode, Marcello Sukhdeo talks about the rise in global arms sales, Canada and UAE sign defence cooperation agreement and the investment of the government in quantum technology. Show Notes: The world's 100 biggest weapons companies have increased arm sales for the first time in five years, reaching more than 370 billion dollars annually. In its annual assessment of global arms sales, the Stockholm International Peace Research Institute recently published a report that shows that last year saw the end of five consecutive years of decline with a 1.9 per cent increase in total sales. “The growth in arms sales was expected and is driven by the implementation of new national major weapons programmes, ongoing military operations in several countries and persistent regional tensions that are leading to increased demand for weapons,” the report states. Those weapons programmes include substantial investment in naval and air capacity, including submarines in the US and UK, as well as new-generation combat aircraft such as the F-35, made by Lockheed Martin. The US, with the world's largest defence budget, has identified spending last year of $45bn on aircraft and related systems and $27bn on shipbuilding and maritime systems. Canada and UAE sign defence cooperation agreement Canada and the United Arab Emirates (UAE) have signed a defence cooperation arrangement that will make it easier for the Canadian defence industry to access one of the world's most lucrative arms markets and bolster military ties between the two countries. Defence Minister Harjit Sajjan signed the agreement during his five-day tour of the Middle East that included stops in Jordan, the UAE and Kuwait. “The signing of the Canada-UAE Defence Cooperation Arrangement is a testament to the enduring partnership between our nations,” Sajjan said in a statement. “We will continue our joint efforts to counter violent extremism in the Middle East as we work to build a more peaceful and prosperous world for both Canadians and the Emirati people.” The UAE ranks among the top 15 defence spenders in the world, according to Business Monitor International. Government of Canada invests in national security technology The Canadian Space Agency (CSA) is awarding $1.5 million to the University of Waterloo's Institute for Quantum Computing (IQC) to lead the science of a mission called the Quantum Encryption and Science Satellite (QEYSSat), which will protect the communications and data of Canadians on Earth and in space. It is estimated that within 10 to 20 years, the encryption codes used by computers today will be easily decoded by high-performing quantum computers, making current encryption technology obsolete. This investment will advance encryption methods, which use highly advanced computing technology to create unbreakable security codes.
It’s late spring - June 12, 2015 to be precise, and on this day we sat down to discuss: Electronic Legos, Quantum Encryption, Solar Powered Flight, and more. So kick back and ready your ear holes to delve into the nerdfest that is the Citizens of Tech Podcast! The post Citizens of Tech 008 – Solar Powered Dragonfly Modems appeared first on Packet Pushers.
It’s late spring - June 12, 2015 to be precise, and on this day we sat down to discuss: Electronic Legos, Quantum Encryption, Solar Powered Flight, and more. So kick back and ready your ear holes to delve into the nerdfest that is the Citizens of Tech Podcast! The post Citizens of Tech 008 – Solar Powered Dragonfly Modems appeared first on Packet Pushers.
Justin and Jason discuss the details of selling Pluggio, what Justin considers to be the ideal attributes of a SaaS business and his idea for a collaborative web app for doing mockups, the hypercritical startup advise of Ben Horowitrz and Dustin Moskowitz, the surprising wealth of A-list celebrities and Internet entrepreneurs, the Xerox compression bug and the Laravel "returning" bug, Nassim Taleb's Skin in the Game paper, analog mockups, developing an Android app in Titanium, why Apple's board is concerned about the current rate of innovation, the nonsensical empirical risk assessment of the U.S. government, the cynical political theatre of shutting down U.S. embassies based on non-specific terrorist threat, how Snowden was offered one year's asylum in Russia as well as a job by social networking giant VKontakte, why Lavabit and Silent Circle both shut down their encrypted email services, how the TSA is rapidly expanding beyond the confines of the airport and the increasing militarization of local police, the lurching surveillance / police state and the possibility of a quantum internet.
Justin and Jason discuss the details of selling Pluggio, what Justin considers to be the ideal attributes of a SaaS business and his idea for a collaborative web app for doing mockups, the hypocritical startup advise of Ben Horowitz and Dustin Moskowitz, the surprising wealth of A-list celebrities and Internet entrepreneurs, the Xerox compression bug and the Laravel "returning" bug, Nassim Taleb's Skin in the Game paper, analog mockups, developing an Android app in Titanium, why Apple's board is concerned about the current rate of innovation, the nonsensical empirical risk assessment of the U.S. government, the cynical political theatre of shutting down U.S. embassies based on non-specific terrorist threat, how Snowden was offered one year's asylum in Russia as well as a job by social networking giant VKontakte, why Lavabit and Silent Circle both shut down their encrypted email services, how the TSA is rapidly expanding beyond the confines of the airport and the increasing militarization of local police, the lurching surveillance / police state and the possibility of a quantum internet.
Kim Falconer History: I wrote my first story about a Halloween Cat in 1959. I was five years old! By the 1970's, I was writing reams of epic poetry inspired by JRR Tolkien's Silmarilion and his academic paper 'On Fairy Stories'. None of those earlier works survived my teens and 20's nor did any make it to publication. I can't tell you how relieved I am about that! I have published extensively in the field of astrology though, and in herbal medicine, childbirth and lactation. I've also written everything from lyrics to funding applications, and course outlines to web content. My Astrology, Mythology and Law of Attraction web site is full of articles and links! The Novels: My first trilogy, Quantum Enchantment, hit the bestsellers list within a week of release and my second series, Quantum Encryption, delivers another searing and imaginative journey of intimacy and adventure, magic and technology. Path of the Stray, Road to the Soul and Journey by Night return to the hidden world of Gaela, an agrarian based magical world where all things — animal, tree, stone, river and storm — are considered equal. Juxtaposed is a post apocalyptic future Earth where technology has failed and pure water is the only currency. '
A quantum encryption technique out of Los Alamos National Laboratory could provide smart phone security. Larry Greenemeier reports