Biden administration nears completion of second cybersecurity executive order with plethora of agenda items

Federal agencies would have to address everything from AI to cloud security to access management, sources told CyberScoop.

The post Biden administration nears completion of second cybersecurity executive order with plethora of agenda items appeared first on CyberScoop.

Continue reading Biden administration nears completion of second cybersecurity executive order with plethora of agenda items

Exclusive: Senator calls on Commerce to tighten proposed rules on exporting surveillance, hacking tech to problematic nations

Ron Wyden, D-Ore., fears the regulations have a major loophole and don’t cover enough repressive governments’ agencies.

The post Exclusive: Senator calls on Commerce to tighten proposed rules on exporting surveillance, hacking tech to problematic nations appeared first on CyberScoop.

Continue reading Exclusive: Senator calls on Commerce to tighten proposed rules on exporting surveillance, hacking tech to problematic nations

Threat awareness, cloud security, quantum computing among chief agency cyber policy priorities ahead

The interim Federal Chief Information Security Officer spelled out some 2025 agenda items for feds at CyberTalks.

The post Threat awareness, cloud security, quantum computing among chief agency cyber policy priorities ahead appeared first on CyberScoop.

Continue reading Threat awareness, cloud security, quantum computing among chief agency cyber policy priorities ahead

White House to agencies: Don’t wait to test your post-quantum encryption

Federal agencies can spare themselves interoperability heartburn tomorrow by testing post-quantum encryption algorithms in live conditions today, official says.

The post White House to agencies: Don’t wait to test your post-quantum encryption appeared first on CyberScoop.

Continue reading White House to agencies: Don’t wait to test your post-quantum encryption

No, The Chinese Have Not Broken Modern Encryption Systems with a Quantum Computer

The headline is pretty scary: “China’s Quantum Computer Scientists Crack Military-Grade Encryption.”
No, it’s not true.
This debunking saved me the trouble of writing one. It all seems to have come from this news article, which … Continue reading No, The Chinese Have Not Broken Modern Encryption Systems with a Quantum Computer

The quantum dilemma: Game-changer or game-ender

If someone told you five years ago that you could pose questions to an AI agent about the most vexing issues in science and it could answer back swiftly and meaningfully, you would’ve thought they were joking. But AI has ushered in this reality. The sa… Continue reading The quantum dilemma: Game-changer or game-ender

Unlocking the power of cryptographic agility in a quantum world

In this Help Net Security interview, Glen Leonhard, Director of Key Management at Cryptomathic, discusses the role of cryptographic agility in mitigating risks posed by quantum computing. Cryptographic agility enables organizations to seamlessly transi… Continue reading Unlocking the power of cryptographic agility in a quantum world

New MIT protocol protects sensitive data during cloud-based computation

Deep-learning models have found applications across various industries, from healthcare diagnostics to financial forecasting. However, their high computational demands often require powerful cloud-based servers. This dependency on cloud computing raise… Continue reading New MIT protocol protects sensitive data during cloud-based computation

Offensive cyber operations are more than just attacks

In this Help Net Security interview, Christopher Jones, Chief Technology Officer and Chief Data Officer at Nightwing, talks about some key misconceptions and complexities surrounding offensive cyber operations. Many myths stem from a simplistic view of… Continue reading Offensive cyber operations are more than just attacks