Don’t Rush Quantum-Proof Encryption, Warns NSA Research Director
A quarter-century and many research dollars later, the world still hasn’t created a quantum computer capable of breaking public-key encryption. Keep Reading
A quarter-century and many research dollars later, the world still hasn’t created a quantum computer capable of breaking public-key encryption. Keep Reading
“We’ve put some of the brightest minds in the country on the issue,” said Wray. “We’ve learned that it can, responsibly, be done.” Keep Reading
The HECTOR program seeks to develop a set of tools and programming languages that will allow data to be processed while remaining in an encrypted state. Keep Reading
The agency is in possession of what’s believed to be Connor Betts’s primary phone but can’t open it because it requires a passcode. Keep Reading
Attorney General William Barr renewed the longstanding feud between law enforcement and tech companies over the issue of encryption. Keep Reading
The Government Accountability Office has identified 14 new information system security control deficiencies at the Internal Revenue Service. Eight of these deficiencies relate to access controls, four to configuration management, one to segregation of duties, and one to contingency planning. Keep Reading
The Electronic Horizon Foundation launched in January 2016 as an IT help desk of sorts to walk ISIS supporters through how to encrypt their communications. Keep Reading
It is designed to enable the regions to securely communicate sensitive or classified information within their organizations and with central government authorities. Sectra Tiger/R will be used by key individuals in the security organizations to communicate sensitive information, such as crisis preparedness, information security or incident response capability. Keep Reading
Unsecured IoT devices are what three young computer savants assembled by the hundreds of thousands to mount the October 2016 distributed denial-of-service attack that crippled the internet on the East Coast for most of a day. Experts expect Earth to pass the threshold of 1 trillion internet-connected sensors within five years. Keep Reading
“In collaboration with leading researchers and industry leaders, we plan to gain data-based insights into solving some of the most pressing security challenges related to our core competencies of encryption, authentication, identity and data integrity.” Keep Reading