• Twitter
  • Facebook
  • LinkedIn
  • Instagram
  • YouTube

Computer Village | Authorized HP Dell Apple Acer Lenovo Distributor in Lagos Nigeria.

Powering ICT in Africa

  • HOME
  • ABOUT US
  • BLOG
    • NEWS
  • PRODUCT & SERVICES
    • HP SERVERS PRICE LIST IN LAGOS NIGERIA
    • Hikvision Authorized CCTV Dealers Distributors Lagos Nigeria
    • HPE PROLIANT SERVERS
    • UK USED DURABLE LAPTOPS
    • DELL SERVER PRICE IN LAGOS NIGERIA
    • DELL LAPTOP COMPUTER PRICE LIST IN LAGOS NIGERIA
    • LENOVO LAPTOP COMPUTER PRICE LIST IN LAGOS NIGERIA
    • FAIRLY USED HP LAPTOP PRICE IN LAGOS NIGERIA
    • Computer Monitors, LCD Monitor, LED Monitor
    • DAHUA CAMERA DISTRIBUTOR SUPPLIER IN LAGOS NIGERIA
    • PROJECTOR DEALERS IN LAGOS NIGERIA AND PRICES SPECIFICATIONS
    • HP DESKTOP ALL-IN-ONE PRICE LIST LAGOS NIGERIA
    • COMPUTER ACCESSORIES AND COMPUTER PARTS
    • COMPUTER VILLAGE PRICELIST
  • CONTACT
  • REQUEST A QUOTE

October 3, 2019 By admin Leave a Comment

Start planning for quantum-proof future

So how much time do we have? Each month a new milestone is broken—from Intel’s Tangle Lake and
Google’s Bristlecone with 50- and 72-qubit hurdles—evidence of the race around error-corrected quantum
compute with many companies investing in the promised processing efficiencies.
What do these benchmarks mean for digital businesses? The cryptography supporting the existing and
new systems being put into production today will be broken by quantum. The foundations enabling and
protecting the business—identity, signature, SSL certificates, blockchain identity and non-repudiation,
encryption technologies for data protection—will be null and void.
Although it will take thousands of qubits to become a threat to cryptosystems, Accenture believes that
national labs and nation states will quietly break that processing barrier within the next eight years—by
2025. Most estimates for commercially available quantum computing range from 10-20 years in the future
due to the fragility of quantum computing, which requires an interference-free environment of nearly zero
degrees Kelvin. However, businesses and industries that are targeted by nation state threat campaigns
should anticipate the accelerated timeline because these accomplishments will be largely unreported.
If that isn’t enough, exposure is not limited to business operations and data at some notional point eight
years from now. Another dimension to the threat is the past. Adversaries who have collected intelligence
and information from years of campaigns will also have the keys to a company’s history—and it may be
revealed. Security executives must ask: What information have nation states been collecting about their
business, such as passwords, intellectual property or an understanding of business methods?
Companies must comprehend both the nature of the threat and threat actors to know what they are collecting
now. Understanding threat actors’ motivations is critical to understanding business exposure and prioritizing
remediations around cryptographic methods and other means of protection. Threat intelligence is business
intelligence. Threat intelligence managed service providers provide the deep knowledge and understanding of not
only the threat actors and their sponsorship, but also the marketplace around a company’s data on the dark web.

Clearly, the timeframe to begin strategic mitigation planning is now. With careful preparation,
companies can reduce the exposure of cryptographic systems that provide authentication, integrity
and confidentiality in business operations and communications by making existing enterprise systems
more resilient and migrating away from enterprise systems where compromise is imminent. Those that
begin the process now will be more likely to complete it before the inflection point when quantum
computing is viable and capable of breaking our cryptographic protections. To get started, CISOs
should take these steps:
ASSESS THE CHALLENGE
Gain a big picture understanding of where the risks are across the business. By knowing how
business processes are enabled by cryptographic methods, it will be easier to grasp the scope
of the challenge. In addition, perform a more detailed inventory to capture crypto method, key
length and where the keys and methods are kept and used across storage, enterprise/business
partner infrastructure and applications.
DEVELOP QUANTUM MITIGATION STRATEGIES
Update existing cryptographic methods, evaluate and use new standardized quantum-resistant
methods when released, or turn to alternative controls to protect the data.
Several cryptography-as-a-service solutions have matured and should also be considered.
Vendors that separate key from cryptographic method will position the business to transform
quickly as emerging quantum-proof standards and cryptographic methods are developed,
significantly reducing risk through the business transformation.
To learn more, read Accenture Labs’ upcoming Quantum Cryptography technical white paper for
security IT and administrators, which provides more context, research and analysis of the issue,
along with short-term steps to bridge the gap and long-term steps to maintain new quantum-proof
cryptographic standards.

Filed Under: BLOG

SEAGATE EXTERNAL HARD DRIVES AND SSDS

https://www.youtube.com/watch?v=QGEFdjCgf9I

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Hardware Village

Authorized HP Dell Apple Acer Asus Lenovo Distributor in Lagos Nigeria.

Head Office : 15 Oyebola Street, Lagos, Nigeria

Branch Office : 17 Oremeji street, Computer Village , Ikeja, Lagos.

+2347086258443
+2347049183845

Email 1: info@hardwarevillagengr.com
Email 2: tosinxx@gmail.com

HARDWARE MANUFACTURER

  • TOSHIBA
  • LENOVO
  • DELL
  • ASUS
  • APPLE
  • ACER
  • HP
  • EXTERNAL DRIVE
  • PROJECTOR
  • SERVERS
  • Privacy Policy
  • TOSHIBA
  • LENOVO
  • DELL
  • ASUS
  • APPLE
  • ACER
  • HP
  • EXTERNAL DRIVE
  • PROJECTOR
  • SERVERS
  • Privacy Policy

© Copyright 2018 Hardware Village · All Rights Reserved · Powered by Hardware Village Technology ·