News
GSK Global CISO warns: The quantum threat to enterprise security is already here
47+ min ago (507+ words) Boston, MA | June 2526, 2026" The transition to post-quantum cryptography has become one of the most urgent challenges facing enterprise cybersecurity. According to Michael Elmore, SVP and Global Chief Information Security Officer at Glaxo Smith Kline, organizations that fail to act early…...
CRA Explained: How new EU rules will transform access control and smart security
1+ mon, 4+ day ago (160+ words) 2 N discuss how robust cybersecurity builds lasting trust beyond compliance ahead of the EU's Cyber Resilience Act (CRA)....
Zcash explores quantum recovery tools for shielded funds in future protocol upgrade
4+ hour, 18+ min ago (701+ words) zcash developers are reportedly advancing discussions and technical research into quantum recovery mechanisms designed to protect shielded funds within its orchard protocol, as the broader blockchain industry continues to assess long term risks posed by quantum computing. the initiative focuses…...
Quantum Computing Meets Digital Evidence
5+ day, 16+ hour ago (593+ words) Quantum computing does not just threaten passwords and virtual private networks (VPNs). It goes straight for something legal systems rely on every day: whether digital evidence can be trusted. Courts, investigators, and e-discovery teams lean heavily on cryptography to prove…...
Crypto Systems Could Be Outpaced By Quantum Tech By 2033, Says Hoskinson
13+ hour, 17+ min ago (462+ words) Crypto may need a major overhaul sooner than most people think. Cardano founder Charles Hoskinson pointed to a specific proposal " Bitcoin Improvement Proposal BIP-361 " as a potential path forward for gradually moving Bitcoin users away from older wallet addresses toward…...
Trust must be engineered, not assumed: Digi Cert's Lakshmi Hanspal on AI agents, 47-day certificates & Australia's narrowing window
14+ hour, 46+ min ago (1625+ words) Alex Zaharov-Reutt, Global AI and Technology Editor | Published 18 May 2026 Guest Interview: The internet's plumbing is being re-laid while the water is still on. Certificate lifetimes are moving from 397 days to 47 by 2029, the first cut to 199 days already landed on 24 February…...
AI Agents Break Zero Trust at the Last Mile
18+ hour, 15+ min ago (205+ words) IBM's Grant Miller explains how AI agents break Zero Trust at the 'last mile' and outlines strategies to secure these complex integrations. Visual TL; DR. AI Agents Emerge faces Last Mile Problem. Last Mile Problem creates Zero Trust Gap. Zero…...
Encrypting Application Data in. NET - From AES Basics to Keychains, Rotation, and Searchable Trade-offs
14+ hour, 10+ min ago (1781+ words) Encrypting the data before it reaches the database sounds simple on a slide - AES, a key, done. In a real codebase the simple version breaks the moment you try to rotate the key, or look up a record by email,…...
Estia Health drives Zero Trust security overhaul
14+ hour, 17+ min ago (619+ words) Australia's second-largest residential aged care provider Estia Health is using Zero Trust principles to enable "precise, context-aware access" for anyone interacting with its systems or networks. Estia Health supports more than 10, 000 residents annually across nearly 100 aged care homes. Delivering that…...
Quantum Privacy Achieved: Algorithms Run Securely On Remote Servers
1+ day, 35+ min ago (667+ words) A three-qubit computation, performed entirely without revealing data or the algorithm itself, marks a shift in secure quantum processing. Until now, blind quantum computation relied on optical photons or matter-based qubits, but this work demonstrates the protocol on a modular…...