3 min read
How Should Companies Get Prepared for Quantum Computing Related Threats?
It is not a question of if, but when quantum computing will arrive and be used for malicious purposes, as the expectation is that this new technology...
Dawn M. Turner is a professional author with a passion for technical regulations and standards, as well as for their relevance and impact on corporate operations and industry in general. Dawn has more than 10 years of IT industry experience in hardware, programming & systems & network engineering. Her educational background includes a Certificate in computer operations & programming, CompTIA and Microsoft certifications, including A+, MCSE and MCP, Associates degree with major in business & minor in computer science, Bachelors of Science degree with major in business forensics & minor in accounting and an MBA with concentrations in finance & economics.
3 min read
It is not a question of if, but when quantum computing will arrive and be used for malicious purposes, as the expectation is that this new technology...
3 min read
Keeping data safe in the Cloud has always been a concern for users, hence the need for encrypting data. With more businesses taking advantage of what...
3 min read
In today’s dynamic business landscape, companies need to be agile with their cloud processes to remain competitive. But at the same time, they must...
2 min read
Many industries, including banking, finance and healthcare are required to comply with data security standards under regulations like SOC, NIST, PCI,...
3 min read
Cloud storage via AWS Storage Services is a simple, reliable, and scalable way to store, retrieve and share data. As a third-party cloud vendor, AWS...
3 min read
This article discusses Accenture’s insights on crypto-agility that were derived from its recent research report on preparing for post-quantum...
3 min read
The 2020 Oracle and KPMG Cloud Threat Report focuses on the key risks and challenges organizations face as they implement and maintain cloud...
3 min read
This article discusses how prepared companies are for quantum computing cybersecurity risks based on a recent Deloitte poll and what the current...
2 min read
This article discusses how Cryptomathic’s AWS BYOK Service delivers expanded security to protect cryptographic keys while using AWS cloud...