The Crucial Enterprise Security Challenges That XDR Solutions Address

Image: Unsplash Cross-layered detection and response or XDR is a relatively new security strategy, which offers advanced protection by enabling complete security visibility and response automation. It does not only focus on endpoints but extends its functions into network and user activities. Also, referred to as Expanded Detection and Response, XDR goes beyond endpoints to …

Read more

Apple Will Privacy Improvement Will Cut Facebook Ad Revenue

The Apple iOS 14 operating system will require apps to ask users for permission to collect and share data using Appleā€™s device identifier. Facebook will not collect the identifier for advertisers (IDFA) on our own apps on iOS 14 devices. The identifier was critical for Facebook targeting its audience network ads. Facebook says the Apple …

Read more

Intel’s Ice Lake Xeon Is Great for Encryption

The 32nd Hot Chips conference is happening now. Sander Olson is attending. He has provided presentations to Nextbigfuture that are highlights of the conference. Intel described their Xeon “ice lake” CPU. Intel claims dramatic improvements in encryption, and ice lake should come with 28 cores. Ice Lake incorporates a new microarchitecture, and will be the …

Read more

Cymulate Looks to Make Cybersecurity Testing the Norm for Organizations

Due to rampant cyberattacks, companies are upping their cybersecurity investments. Worldwide security spending is expected to grow by 2.4 percent and hit $123.8 billion this year. However, despite the wider adoption of security tools and solutions, many organizations still have yet to adopt security testing as a core element in their security strategies. Security testing …

Read more

In the Age of Data, Your Online Privacy is Ground Zero

The privacy debate is mostly centered around government snooping especially after the stunning revelations about the sheer volume of raw data that governments and their agencies collect under the guise of protecting national security interests. The Domestic Surveillance Directorate of the NSA says, if you have nothing to hide, you have nothing to fear about …

Read more

Ironbridge Quantum Communication

Cambridge Quantum Computing uses photonics and quantum entanglement to generate truly random numbers. They also constantly verify that quantum randomness is being maintained. Failure to of quantum randomness tests indicates that there has been interference and tampering. Brian WangBrian Wang is a Futurist Thought Leader and a popular Science blogger with 1 million readers per …

Read more

quantum satellite

China’s Quantum Satellite Security Has Been Broken

China created a satellite for secure distribution of keys for encrypted data. The hope was that this would enable totally secure unbreakable transmission of the keys for coded data. Quantum key distribution (QKD) is a secure communication method which implements a cryptographic protocol involving components of quantum mechanics. It enables two parties to produce a …

Read more

quantum satellite

Russian Quantum Hacking Lab

There is a Quantum hacking lab which is a site of the Russian Quantum Center. This site has a collection of videos, research papers and presentations about quantum cryptography and quantum security. Vadim Makarov worked at the University of Waterloo for many years and recently has been in Shanghai and Moscow. Brian WangBrian Wang is …

Read more

AI and Machine Learning Implementation Workshop #suglobalsummit

Neil Jacobstein gave a workshop on AI and Machine Learning Implementation at the 2019 Singularity Summit. It turns out there is a fatal flaw in most companies approaches to machine learning, the analytical tool of the future. 85% of the projects do not get past the experimental phase and so never make production (Forbes, Enrique …

Read more