Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/80/12/9a/80129a22-1569-15a5-f9f2-481d3dcd6e66/mza_541581342092235567.jpg/600x600bb.jpg
Into the Breach by IBM
IBM
14 episodes
9 months ago
Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…
Show more...
Technology
Education
RSS
All content for Into the Breach by IBM is the property of IBM and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…
Show more...
Technology
Education
https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/80/12/9a/80129a22-1569-15a5-f9f2-481d3dcd6e66/mza_541581342092235567.jpg/600x600bb.jpg
The Quantum Quandary: How researchers are bridging the supercomputer security concerns
Into the Breach by IBM
31 minutes
2 years ago
The Quantum Quandary: How researchers are bridging the supercomputer security concerns

Quantum computing relies on quantum physics for computational power and computes much faster than classical computers. It’s predicted to provide major breakthroughs across society, science and business. At the same time, it poses a risk to key cryptographic algorithms we depend upon for the safety of our digital world. Meaning, it has the potential to render existing communications as insecure as if they weren’t encoded at all.


In this episode, host Mitch Mayne talks with one of the scientists working on quantum-safe encryption algorithms. Dr. Walid Rjaibi has spent considerable time experimenting with these algorithms and creating prototypes for transitioning current software to quantum-safe standards.


They talk in-depth about the security risk quantum poses, how researchers are addressing that risk, how policy can (or should) shift to make standardization a reality, and what organizations might struggle with as they shift toward quantum—and how some of those struggles might be addressed.


Things to listen for:

  • [00:05 - 01:34] Introduction
  • [03:55 - 06:05] An overview of quantum computing
  • [06:45 - 11:30] Cyber risks associated with quantum
  • [15:03 - 18:42] Algorithms that are quantum-safe
  • [19:09 - 21:54] Encryption algorithms, RSA deep dive
  • [25:18 - 26:15] Effective policy regulations
  • [26:42 - 29:30] Where to begin when learning about quantum
Into the Breach by IBM
Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…