GUEST OPINION: At the start of each new year, it’s customary to make predictions about what the next 12 months has in store. While this is an interesting exercise, because of the exponential rate of change occurring, looking even further ahead also becomes valuable.
GUEST RESEARCH: Only a third of organisations in Australia are preparing and have the necessary scale or technology to transition to post-quantum cryptography
Quantum computers are on their way to surpassing their classical computer counterparts in practical applications. When this happens the bulk of the world's cryptography is rendered null and void. It's time to ensure you are ready for the new era, says DigiCert.
Cloudflare is on a mission to build a better Internet. And part of how it achieves this is through a wall of lava lamps. Yes, truly. This wall helps generate random numbers for cryptographic keys. It's the Wall of Entropy, and I ventured to CloudFlare HQ to take a look for myself.
Once it was unthinkable to use a credit card online. Today, online commerce is booming, and there's a small army working to ensure this trust is not misplaced. However, recent technological advancements mean digital trust must evolve to keep us protected. And the time to act is now.
A Monash University led program aims aims to train Indo-Pacific organisations in post-quantum cryptography.
IBM's new z16 mainframe features an integrated on-chip AI accelerator, allowing inferencing from real-time transactions.
Nearly 10 months after it was taken down by authorities in Europe, the US and Canada, the Emotet botnet appears to have returned, with at least one of the bots associated with it being observed by a security firm.
The open-source OpenSSL project has released an updated version of its software, 1.1.1k, to fix two vulnerabilities, the severity of both of which has been described as "high".
Cryptography expert Ronald Rivest has dismissed the idea that blockchains would be of any use in voting systems, saying it was something like bringing a combination lock to a kitchen fire.
Microsoft has released a patch for a vulnerability in crypt32.dll, a library used for authentication, a flaw it rates important, the second rank on its severity rating list, but which the NSA has seen fit to issue an advisory about, something the agency never does.
Turing Award winner Adi Shamir, the renowned cryptographer who provides the initial S in the well-known RSA cryptography algorithm, is missing from the annual RSA Security conference as he apparently could not obtain a visa to enter the United States.
For the first time ever, ICANN is changing the cryptographic keys that secure DNS. ISPs must ensure their software is up-to-date or risk their customers being unable to reach any site on the Internet.
CryptoAUSTRALIA is running a workshop on 5 July to help you build your own end-to-end encrypted chat server ... while you still can.
Australia’s obsession with national security continues to have unintended consequences, with the academic exchange of information about cryptography now in danger.
Canberra-based QuintessenceLabs has been awarded funding in excess of $1 million from the Department of Defence.
Commencing in January 2012, Stanford University is running a number of on-line based courses. Dive in! Be educated!
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]
I wonder when they will implement all of this, and what the pricing plans will be.FWIW, these days the proposed[…]