Page 1,073«..1020..1,0721,0731,0741,075..1,0801,090..»

Senate Bill Crafted With DEA Targets End-to-End Encryption … – Slashdot

A bill requiring social media companies, encrypted communications providers and other online services to report drug activity on their platforms to the U.S. Drug Enforcement Administration (DEA) advanced to the Senate floor Thursday, alarming privacy advocates who say the legislation turns the companies into de facto drug enforcement agents and exposes many of them to liability for providing end-to-end encryption. From a report: The bipartisan Cooper Davis Act -- named for a Kansas teenager who died after unknowingly taking a fentanyl-laced pill he bought on Snapchat -- requires social media companies and other web communication providers to give the DEA users' names and other information when the companies have "actual knowledge" that illicit drugs are being distributed on their platforms.

Many privacy advocates caution that, if passed in its current form, the bill could be a death blow to end-to-end encryption services because it includes particularly controversial language holding companies accountable for conduct they don't report if they "deliberately blind" themselves to the violations. Officials from the DEA have spent several months honing the bill with key senators, Judiciary Committee Chairman Dick Durbin (D-IL) said Thursday. Providers of encrypted services would face a difficult choice should the bill pass, said Greg Nojeim, Senior Counsel & Director of Security and Surveillance Project at the Center for Democracy and Technology. "They could maintain end-to-end encryption and risk liability that they had willfully blinded themselves to illegal content on their service and face the music later," Nojeim said. "Or they could opt to remove end-to-end encryption and subject all of their users who used to be protected by one of the best cybersecurity tools available to new threats and new privacy violations."

Read this article:
Senate Bill Crafted With DEA Targets End-to-End Encryption ... - Slashdot

Read More..

Cigent Announces New Pre-Boot Authentication (PBA) Full Drive … – PR Web

Cigent

FORT MYERS, Fla. (PRWEB) July 18, 2023

Cigent Technology, Inc., the leader in embedded cybersecurity in storage devices, today unveiled Cigent Data Defense Pre-Boot Authentication, which Enables a TCG Opal 2.0 Self Encrypting Drive to be fully encrypted, preventing adversaries from being able to access the data if they get physical access to the PC or storage device. Cigent PBA Software has been FIPS Validated and posted on the NIAP Common Criteria Products in Evaluation site, the precursor to certification by NIAP and listing on the Product Compliant List and posting on CSfC Component List.

When installed on a Seagate Barracuda 515 or DIGISTOR C Series drive (both on the NIAP Product Compliant List), Cigent offers CSfC DAR Capabilities Package 5.0 compliant Full Drive Encryption protection with FDE_EE (encryption engine) and FDE_AA (authentication) NIAP Protection Profiles compliance. Cigent Data Defense PBA supports multiple forms of authentication including username and password, CAC/PIV/Yubikey, or both to be fully NIST MFA compliant and adhere to both MFA and Zero Trust requirements outlined in the US Executive Order 14028.

Furthermore, both the Seagate Barracuda 515 and DIGISTOR C Series Advanced Secure SSDs include Cigent's embedded cybersecurity protections in firmware. These protections include Complete Erasure Verification, Immutable Insider Threat data access logs, and a firmware-heartbeat that automatically locks and makes Cigent Secure Vaults invisible if the Cigent software service is disabled.

With Data Defense Pre-Boot Authentication, an authentication screen pops up when the computer is turned on. The user can then authenticate to decrypt the drive. Cigents PBA software uses RSA 4096-bit encryption keys for authentication and can be used in conjunction with Cigent Data Defense Secure Vault to create a post-boot hidden partition for storage of sensitive data that requires MFA for access and uses Cigent advanced key creation and storage for partition protection.

"By achieving FIPS validation and inclusion in the NIAP Common Criteria Products in Evaluation, Cigent Data Defense PBA demonstrates our commitment to meeting rigorous government security standards, said Tom Ricoy, CRO at Cigent. These validations help to ensure that the organizations with extremely sensitive data can utilize the advanced data security solutions from Cigent.

The PBA software also enables the administrator to securely wipe data from drives with Cigent True Erase. This includes a Crypto Erase that deletes the decryption key rendering the encrypted data inaccessible. For added assurances, a full drive erasure (using a Format NVM function to Full Flash Overwrite, zeroing every block on the drive, resetting the drive back to its factory state) completely overwrites the disk to remove all data. Cigents patented True Erase capability built into the firmware of Cigent Secure SSDs also verifies that every block has truly been wiped after erasure. Within seconds, True Erase performs all three of these functions enabling the drive to be safely repurposed or sent off for destruction.

To learn more about the Cigent Data Defense Pre-Boot Authentication Software please visit the Resource Library - Cigent Technology Inc.

About Cigent Cigent offers a new approach to data security to stop ransomware and data theft, as well as achieve compliance. Cigent protects your most valuable asset - your data - against the most sophisticated adversaries. We protect data throughout its lifecycle via prevention-based defenses embedded into storage and individual files. From decades of data recovery, cybersecurity, and device sanitization experience, the experts at Cigent have developed prevention methods beyond anything that exists today.

Share article on social media or email:

Link:
Cigent Announces New Pre-Boot Authentication (PBA) Full Drive ... - PR Web

Read More..

How to encrypt a file within seconds in Linux! – Medium

The art of Cryptography consists of two parts Encryption and Decryption. One is the exact reverse of the other and they are both powered by some serious math. The purpose of Cryptography is to hide the content of a message so that if someone, other than the receiver of the message, finds it, they wont be able to read it.

In this article I will show you the easiest way to encrypt a file in Linux in just a few seconds using the GNU Privacy Guard(gpg tool).

In most modern Linux distros the gpg tool is already pre-installed. To check if gpg is installed on your system, run:

If gpg is not installed on your system simply run:

Once installed on your system, you can start encrypting your files by running:

Then we provide an easy to remember passphrase and we are done. A new encrypted version of the file is created alongside the original one but with the .gpg extension.GPG offers many encoding algorithms, meaning that you can choose which one will be used to encrypt your data.To list the algorithms run:

You can select a specific algorithm by running instead:

In order to decrypt a file you simply run the following command and then provide the passphrase that was used to encrypt it.

Note:If you encrypt a file and then try to decrypt it you may not be promted with a passphrase request. Cache needs to be cleared first in order for a passphrase to be requested.

See original here:
How to encrypt a file within seconds in Linux! - Medium

Read More..

Leading the Way with Radical Transparency – CISA

Today, the Administration announced the U.S. Cyber Trust Mark, an Internet of Things (IoT) labeling initiative led by the Federal Communications Commission and the National Institute of Standards and Technology. The initiative will give consumers a way of understanding whether IoT products meet a cybersecurity baseline to improve overall safety. At CISA, we heartily applaud this effort and are excited to work with both our public and private sector partners to continue to embrace such transparency for a safer and more secure nation.

We talk a lot about a future where market forces drive stronger security, but to make this a reality, we need to be able to evaluate products based on their security. And we certainly havent made that easy for customers to date. As it stands, too often security claims are written by marketing teams and not based on actual evidence. For instance, marketing teams often claim military grade encryption when in reality, military grade encryption is no different from standard encryption, but how could a hospital system, a water treatment facility, or a school district know this?

In April, CISA, along with nine domestic and international partners, released a Secure by Design white paper, detailing our collective vision for a more secure future where technology manufacturers assume more of the burden of security. A key principle in that document that manufacturers must embrace radical transparency and accountability is particularly relevant to todays Cyber Trust Mark announcement, and one of the reasons we at CISA are so enthusiastic about it. This initiative will enable customers to understand more about the security of devices they are considering purchasing, and ultimately, gravitate to more secure products, just as nutrition labels help customers make healthier choices about the food they buy at the grocery store.

Radical transparency can take many formsfrom security labeling, to a software provider publishing statistics on adoption of multi-factor authentication, to a technology manufacturer writing a blog post on their efforts to eliminate an entire class of vulnerability from their codebasesbut all are important for a holistic understanding of our individual as well as our collective cybersecurity posture.

We are now working on the next iteration of our Secure by Design guidance, which will detail ways that technology manufacturers can demonstrate their adherence to Secure by Design principles, including radical transparency. If you happen to be attending DEFCON this summer, we will be hosting a workshop inviting the security community to provide feedback. You can also reach out to us at SecureByDesign@cisa.dhs.gov with your thoughts.

See the article here:
Leading the Way with Radical Transparency - CISA

Read More..

Protecting Sensitive Information: A Comprehensive Guide to Email … – Fagen wasanni

Understanding the Importance of Cybersecurity: A Detailed Guide on Email Encryption Strategies for Businesses to Protect Sensitive Information

In the digital age, the importance of cybersecurity cannot be overstated. As businesses increasingly rely on electronic communication, the need to protect sensitive information has become paramount. One of the most effective ways to safeguard this data is through email encryption, a strategy that is becoming a standard practice for businesses worldwide.

Email encryption is a method of protecting information by converting it into an unreadable format, known as ciphertext, which can only be deciphered with a unique decryption key. This ensures that even if an unauthorized party intercepts the email, they will not be able to access the sensitive information it contains.

The need for such measures has been underscored by the rise in cybercrime. According to a report by Cybersecurity Ventures, cybercrime is predicted to cost the world $6 trillion annually by 2021, up from $3 trillion in 2015. This staggering figure highlights the urgent need for businesses to implement robust cybersecurity measures, with email encryption being a critical component.

There are several types of email encryption strategies that businesses can employ. The first is Transport Layer Security (TLS), which encrypts the connection between the sender and the recipients mail servers. This prevents hackers from intercepting the email while it is in transit. However, if the recipients server does not support TLS, the email will be sent unencrypted.

Another strategy is end-to-end encryption, which ensures that the email is encrypted from the moment it leaves the senders device until it reaches the recipient. This method is more secure than TLS as it protects the email even if it is intercepted during transit or while stored on the mail servers.

Businesses can also use Secure/Multipurpose Internet Mail Extensions (S/MIME) or Pretty Good Privacy (PGP) encryption. S/MIME uses a centralized authority to issue certificates that verify the senders identity and encrypt the email. PGP, on the other hand, uses a decentralized model where users generate their own encryption keys.

While these strategies offer robust protection, they are not without challenges. For instance, end-to-end encryption can be complex to implement and may not be compatible with all email clients. S/MIME and PGP also require users to manage their encryption keys, which can be a daunting task for non-technical users.

Despite these challenges, the benefits of email encryption far outweigh the drawbacks. By protecting sensitive information, businesses can avoid costly data breaches, maintain customer trust, and comply with data protection regulations. Moreover, as cyber threats continue to evolve, implementing robust encryption strategies will be crucial in staying one step ahead of cybercriminals.

In conclusion, email encryption is a vital component of a comprehensive cybersecurity strategy. By understanding the different encryption strategies and their benefits and challenges, businesses can make informed decisions about how to best protect their sensitive information. As the digital landscape continues to evolve, so too must our strategies for safeguarding our data.

Read the original post:
Protecting Sensitive Information: A Comprehensive Guide to Email ... - Fagen wasanni

Read More..

API Security: 10 Issues and How To Secure – CrowdStrike

What is API security?

Many organizations allow customers to access their data through an application programming interface (API) so they can build customized solutions on top of it. But this access comes with risks, making API security a crucial element of a businesss success.

API security involves implementing measures to safeguard data confidentiality, integrity, and availability. These measures include setting up authentication and authorization mechanisms that permit only authorized users and applications to access the API, and implementing encryption and other security protocols to protect data in transit and at rest.

Additionally, API security encompasses monitoring and logging to detect and respond to security incidents, and conducting regular testing and vulnerability assessments to identify and address potential security weaknesses.

These security measures mitigate serious risks, as API breaches can have severe consequences for individuals and organizations alike. Attackers can exploit vulnerabilities in APIs to access sensitive data, such as personal information, financial details, and login credentials potentially resulting in identity theft, fraud, and other cybercrimes. Attackers can also carry out denial-of-service attacks, which prevent the use of the hacked API.

For companies that rely on APIs to connect with third-party services, a violation can lead to reputational damage, financial losses, legal action, fines, and regulatory sanctions. Thats why prioritizing API protection and regularly monitoring for potential violations protects both an organization and its users.

Download this new report to learn about the most prevalent cloud security threats from 2023 to better protect from them in 2024.

The terms API security and application security are often confused, but they are two different concepts. APIs have a bigger attack surface than web applications because APIs are designed to accommodate a wide range of clients. At the same time, wide-ranging accessibility makes APIs more vulnerable to security threats. The authentication schemes APIs use also differ from those used by web applications. For example, APIs use token-based authentication, whereas applications commonly use two-factor schemes that send users a code on their smartphone that they manually enter into the application alongside their password.

If we look at the OWASP top 10 security risks for APIs, we also see they differ from that of web applications. The list of the top 10 security risks for web applications includes things like UI design flaws and using vulnerable UI components, while the list of API risks centers on authorization issues on the systems object or function level.

There is a range of standards to consider when building an API that can keep it secure. These standards are mostly related to encryption, authentication, and authorization. Some of them, like Transport Layer Security (TLS), are so tightly integrated into basic internet protocols that youre using them right now while reading this article.

Lets check out the five most important standards.

TLS encryption is a protocol that secures client and server connections over the internet. It encrypts data in flight to prevent intermediaries from reading the transferred data. This encryption technology is widely used in e-commerce, online banking, and other web-based applications to protect sensitive information.

A popular authorization protocol, OAuth (open authorization) allows an organization to grant third-party applications access to its APIs on a website without sharing its credentials. Instead of giving the application a password, OAuth generates a token that authorizes access to an account for a specific time period.

Security Assertion Markup Language (SAML) is an XML-based standard for authentication and authorization data exchanges. Commonly used in internal or business-to-business applications, SAML helps build single sign-on (SSO) solutions that eliminate the need for a user to remember multiple login credentials.

JSON Web Token (JWT) is a token format that is optimized to be represented in URLs, transferred via HTTP, and read with JavaScript inside a browser. The tokens represent access claims for services and are used for authentication and authorization. They contain detailed information such as user ID and expiration time, and standards like OAuth use tokens in the JWT format as their access tokens.

Representational state transfer (REST) is one of the most common architectural styles on the internet. The OWASP REST Security Cheat Sheet provides guidelines for securing REST APIs against common threats, such as injection attacks, broken authentication, and sensitive data exposure. One recommended approach is to use JWT, a secure and streamlined method for transmitting data and managing user authentication.

Learn the top 12 cloud security risks, threats, and challenges you should keep an eye on to keep your cloud computing environment safe. Cloud Security Issues

The most common security risks for APIs relate to authorization issues, but other factors can also present pressing security concerns. Lets look at 10 of the most prevalent API security issues (according to OWASP) and explore how to prevent them.

This risk occurs when an API does not correctly enforce object-level authorization, allowing attackers to access or modify data they should not have access to. To prevent this issue, use a centralized access control mechanism to manage object-level authorization. This mechanism should be able to enforce access control policies at the object level and handle complex relationships between objects.

This risk occurs when an API does not properly authenticate users, allowing attackers to impersonate legitimate users and access sensitive data. To mitigate the risks that broken user authentication presents, implement multi-factor authentication and use secure password storage mechanisms. Multi-factor authentication adds an extra layer of security by requiring the possession of multiple devices to log in. Secure password storage mechanisms, such as hashing and salting, make it more difficult for attackers to crack passwords.

In systems that use large objects, a typical risk is that one object exposes more data than necessary. Even when the system uses object-level authorization, an object may still have properties that include sensitive data. The solution is to use encryption to protect sensitive data and limit the amount of data exposed. Encryption can help protect data in transit and at rest. Filtering object properties before sending them to a client can help reduce the impact of a data breach.

When an API does not properly allocate resources or enforce rate limits, attackers can launch denial-of-service attacks. To prevent these attacks, implement rate limiting and resource allocation mechanisms. Rate limiting can keep attackers from overwhelming the API with requests, and resource allocation mechanisms help ensure that resources are allocated fairly and efficiently.

This risk occurs when an API doesnt require authorization for each of its endpoints. This can allow attackers to call endpoints that should only be used by an administrator. Using a centralized access control mechanism to manage function-level authorization can help mitigate this risk. The access control mechanism should be able to enforce access control policies at the function level and should be capable of handling complex relationships between functions.

When an API accepts a URL from a client to fetch data from a third-party service and doesnt validate the URL, it allows an attacker to submit malicious URLs that can expose internal services or scan the API for open ports. Employing URL allowlists or filtering internal hostnames and IPs can help prevent this problem.

Following safe coding practices and regularly updating software and security configurations are key steps to configuring APIs securely so attackers cant exploit vulnerabilities. Using secure defaults, disabling unnecessary features, and regularly updating software and security configurations are just a few best practices for hardened security configuration.

Automation can allow attackers to exploit regular business flows for financial gain by referring bots to a paid referral program or buying a limited product excessively to resell it later. Though some of these activities may not be illegal, they can still lead to reputation loss or financial losses for the organization. To keep this risk at bay, ensure that purchasing flows include reasonable limitations per person and referral programs are paid out only when a proof of personhood has been supplied. Device fingerprinting and blocking of suspicious IPs like Tor exit nodes are also recommended measures.

When an API does not properly manage assets such as keys and certificates, unauthorized users can gain access to sensitive information. This is another reason its critical to employ secure coding practices and regularly update software and security configurations. Asset management can also include using secure defaults and disabling unnecessary features.

APIs often use APIs from third parties to get their work done. In many cases, these third-party APIs are treated as inherently secure. But these APIs can still become an attack vector into a system, allowing malicious users to indirectly send problematic inputs, such as SQL injections or forged URLs. Sanitizing inputs is vital not just inputs from clients but from all systems that can enter data into your API. Employing allowlists for hostnames and restricting redirects can help ensure the safety of third-party APIs.

Managing API security can seem complex, but it doesnt have to be. The CrowdStrike Falcon platform assesses your API security posture across multiple hosts, keeping an eye on your service configurations and helping to test for potential threats. With CrowdStrike Threat Graph, cloud-scale AI analyzes API events in real time.

Try the Falcon platform today to enrich your endpoint and workload telemetry with actionable security insights. Start your free trial of the Falcon platform now.

Read the original here:
API Security: 10 Issues and How To Secure - CrowdStrike

Read More..

Quantum Cryptography and Encryption Market to Garner Brimming … – Chatfield News-Record

The Quantum Cryptography and Encryption Market report aims to provide insight into the industry through detailed market segmentation. The report offers detailed information on the overview and scope of the market along with its drivers, restraints, and trends. This report is designed to include qualitative and quantitative aspects of the industry in each region and country participating in the study.

The report presents a thorough overview of the competitive landscape of the global Quantum Cryptography and Encryption Market and the detailed business profiles of the markets notable players. Threats and weaknesses of leading companies are measured by the analysts in the report by using industry-standard tools such as Porters five force analysis and SWOT analysis. The Quantum Cryptography and Encryption Market report covers all key parameters such as product innovation, market strategy for leading companies, Quantum Cryptography and Encryption market share, revenue generation, the latest research and development and market expert perspectives.

Request To Download Sample of This Strategic Report@ https://globalmarketvision.com/sample_request/213457

Key Players Mentioned in the Global Quantum Cryptography and Encryption Market Research Report:

ID Quantique, Qrypt, Single Quantum, Post-Quantum, Crypto Quantique, CryptoNext Security, Quantum Resistant Ledger, InfiniQuant, Agnostiq, ISARA Corporation, KETS Quantum Security, MagiQ Technologies, PQShield, Qabacus, Qaisec, Qasky Quantum Technology

Global Quantum Cryptography and Encryption Market Segmentation:

Market Segmentation: By Type

Code-BasedLattice-BasedOthers

Market Segmentation: By Application

FinancialGovernmentMilitary & DefenseOthers

The report provides a good overview of the key macroeconomic factors that have a significant impact on the growth of the Quantum Cryptography and Encryption market. It also provides absolute dollar opportunity analysis, which is essential for identifying revenue-generating and increasing sales opportunities in the Quantum Cryptography and Encryption market. Market players can utilize the qualitative and quantitative analysis provided in the report to fully understand the Quantum Cryptography and Encryption market and make great strides in the industry in terms of growth. The overall size of the Quantum Cryptography and Encryption market and the overall size of each segment studied in the report are precisely calculated based on various factors.

The base of geography, the world market of Quantum Cryptography and Encryption has segmented as follows:

COVID-19 Impact

Report covers Impact of Coronavirus COVID-19: Since the COVID-19 virus outbreak in December 2019, the disease has spread to almost every country around the globe with the World Health Organization declaring it a public health emergency. The global impacts of the coronavirus disease 2019 (COVID-19) are already starting to be felt, and will significantly affect the Quantum Cryptography and Encryption Market in 2023.

The outbreak of COVID-19 has brought effects on many aspects, like flight cancellations; travel bans and quarantines; restaurants closed; all indoor/outdoor events restricted; over forty countries state of emergency declared; massive slowing of the supply chain; stock market volatility; falling business confidence, growing panic among the population, and uncertainty about future.

The objective of the studies:

To provide a detailed analysis of the market structure along with a forecast of the various segments and sub-segments of the global Quantum Cryptography and Encryption Market.

-Provide information on factors affecting the growth of the market. To analyze the Quantum Cryptography and Encryption Market based on various factors- price analysis, supply chain analysis, Gate Five force analysis, etc.

-Provide historical and forecast revenue of market segments and sub-segments for four major geographies and their countries North America, Europe, Asia, Latin America and Rest of the World.

-Provide country level market analysis relative to current market size and future prospects.

To provide country level market analysis for the segment by application, product type and sub-segments.

-Provide a strategic profile of the major market players, by deeply analyzing their core competencies and drawing a competitive landscape for the market.

Track and analyze competitive developments such as joint ventures, strategic alliances, mergers and acquisitions, new product developments, and research and developments in the global Quantum Cryptography and Encryption Market.

Table of Contents:

1 Study Coverage

2 Market by Type

3 Market by Application

4 Global Quantum Cryptography and Encryption Competitor Landscape by Company

5 Global Quantum Cryptography and Encryption Market Size by Region

6 Segment in Region Level & Country Level

7 Company Profiles

8 Industry Chain and Sales Channels Analysis

9 Research Findings and Conclusion

Conclusion: At the end of Quantum Cryptography and Encryption Market report, all the findings and estimation are given. It also includes major drivers, and opportunities along with regional analysis. Segment analysis is also providing in terms of type and application both.

Request Full Report @ https://globalmarketvision.com/checkout/?currency=USD&type=single_user_license&report_id=213457

If you have any special requirements, please let us know and we will offer you the report at a customized price.

Relevant points Highlighted:

About Global Market Vision

Global Market Vision consists of an ambitious team of young, experienced people who focus on the details and provide the information as per customers needs. Information is vital in the business world, and we specialize in disseminating it. Our experts not only have in-depth expertise, but can also create a comprehensive report to help you develop your own business.

With our reports, you can make important tactical business decisions with the certainty that they are based on accurate and well-founded information. Our experts can dispel any concerns or doubts about our accuracy and help you differentiate between reliable and less reliable reports, reducing the risk of making decisions. We can make your decision-making process more precise and increase the probability of success of your goals.

Contact Us

Sarah Ivans | Business Development

Phone: +1 617 297 8902

Phone: +44 151 528 9267

Email: sales@globalmarketvision.com

Global Market Vision

Website: http://www.globalmarketvision.com

Here is the original post:
Quantum Cryptography and Encryption Market to Garner Brimming ... - Chatfield News-Record

Read More..

Encryption Keyboard Market Report Covers Future Trends with … – Chatfield News-Record

Encryption Keyboard Market research is an intelligence report with meticulous efforts undertaken to study the right and valuable information. The data which has been looked upon is done considering both, the existing top players and the upcoming competitors. Business strategies of the key players and the new entering market industries are studied in detail. Well-explained SWOT analysis, revenue share, and contact information are shared in this report analysis.

Get the PDF Sample Copy (Including FULL TOC, Graphs, and Tables) of this report @:

https://www.researchcognizance.com/sample-request/234723

Some of the Top companies Influencing this Market include:

VeriFone, Cryptera, Preevio, Microsoft, Hitachi, SZZT Electronics, Justtide Tech, Sunson Tech

This report provides a detailed and analytical look at the various companies that are working to achieve a high market share in the global Encryption Keyboard market. Data is provided for the top and fastest-growing segments. This report implements a balanced mix of primary and secondary research methodologies for analysis. Markets are categorized according to key criteria. To this end, the report includes a section dedicated to the company profile. This report will help you identify your needs, discover problem areas, discover better opportunities, and help all your organizations primary leadership processes. You can ensure the performance of your public relations efforts and monitor customer objections to stay one step ahead and limit losses.

The report provides insights on the following pointers:

Market Penetration:Comprehensive information on the product portfolios of the top players in the Encryption Keyboard market.

Product Development/Innovation: Detailed insights on upcoming technologies, R&D activities, and product launches in the market.

Competitive Assessment: In-depth assessment of the market strategies, geographic and business segments of the leading players in the market.

Market Development:Comprehensive information about emerging markets. This report analyzes the market for various segments across geographies.

Market Diversification:Exhaustive information about new products, untapped geographies, recent developments, and investments in the Encryption Keyboard market.

Get a Special Discount of up to 30% on this Report @:

https://www.researchcognizance.com/discount/234723

The cost analysis of the Global Encryption Keyboard Market has been performed while keeping in view manufacturing expenses, labor cost, and raw materials and their market concentration rate, suppliers, and price trend. Other factors such as Supply chain, downstream buyers, and sourcing strategy have been assessed to provide a complete and in-depth view of the market. Buyers of the report will also be exposed to a study on market positioning with factors such as target client, brand strategy, and price strategy taken into consideration.

GlobalEncryption Keyboardmarket segmentation:

Market Segmentation: By Type

ATMCRSCDM

Market Segmentation: By Application

BankingFinancial Institution

Key questions answered in this report:

Table of Contents

Global Encryption Keyboard Market Research Report 2023-2030

Chapter 1 Encryption Keyboard Market Overview

Chapter 2 Global Economic Impact on Industry

Chapter 3 Global Market Competition by Manufacturers

Chapter 4 Global Production, Revenue (Value) by Region

Chapter 5 Global Supply (Production), Consumption, Export, Import by Regions

Chapter 6 Global Production, Revenue (Value), Price Trend by Type

Chapter 7 Global Market Analysis by Application

Chapter 8 Manufacturing Cost Analysis

Chapter 9 Industrial Chain, Sourcing Strategy, and Downstream Buyers

Chapter 10 Marketing Strategy Analysis, Distributors/Traders

Chapter 11 Market Effect Factors Analysis

Chapter 12 Global Encryption Keyboard Market Forecast

Buy Exclusive Report @:

https://www.researchcognizance.com/checkout/234723

Get in Touch with Us:

Neil Thomas

116 West 23rd Street 4th Floor New York City, New York 10011

sales@researchcognizance.com

+1 7187154714

https://researchcognizance.com

Read the original here:
Encryption Keyboard Market Report Covers Future Trends with ... - Chatfield News-Record

Read More..

How to introduce quantum computers without slowing economic … – Nature.com

The race is on to develop commercial quantum computers. The breakthroughs they promise new ways of simulating materials, optimizing processes and improving machine learning could transform society, just as todays digital computers have done. But the route to delivering economic benefits is uncertain. The digital revolution took decades and required businesses to replace expensive equipment and completely rethink how they operate. The quantum computing revolution could be much more painful1.

Quantum computers operate in a completely different way from digital computers, and can potentially store and analyse information more efficiently. Digital computers essentially use onoff switches and process binary bits of information (0s and 1s). Quantum computers encode information in the quantum state of atoms, electrons and photons, known as qubits. These qubits can represent many states at once and be combined or entangled, thereby speeding up calculations.

In the long run, businesses adopting quantum computing should have a competitive edge over others. Yet, in the short term, its unclear to what extent the introduction of these machines will prove commercially valuable.

When digital computers started to gain popularity in the 1970s and 1980s, rather than delivering efficiencies, for 15 years they slowed growth in productivity, the value added relative to inputs such as labour, by 0.76 percentage points per annum. Such a dip is known as the productivity paradox. It arose because businesses had to invest in new equipment and learn how to program the devices, as well as work out what to use them for. At first, firms did not invest enough in other innovations that were needed to change core processes and business models2,3. Only after many sectors had adjusted in the 1990s did productivity growth rise again, sharply (see Productivity paradox).

Source: The Conference Board Total Economy Database, 2022

For example, it took a decade of investment, throughout the 1980s, for large firms, such as the retail corporation Walmart, to routinely process data to coordinate planning, and to forecast and replenish their inventory along their supply chains. Walmart gave suppliers access to its sales and inventory data, helping to reduce costs from underproduction or overproduction. The company became able to handle its own distribution and achieve efficiency through economies of scale. All these changes took time and required coordination across many firms2.

We think that the quantum computing revolution could lead to an even more severe and expensive learning curve, for three reasons: high integration costs and few short-term rewards; difficulty in translating quantum concepts for business managers and engineers; and the threat to cryptography posed by quantum computers. As a consequence, assuming that the productivity growth rate slows by 50% more than it did for simpler digital computers, we estimate that the introduction of commercial quantum computers could result in economic losses in gross domestic product (GDP) per capita of approximately US$13,000 over 15 years (based on 2022 levels), or $310 billion per annum in the United States alone.

Fortunately, there are ways to lighten the load and accelerate the benefits to society, three of which we outline here.

Firms might initially adopt quantum computers to solve existing business problems, for which improvements are likely to be incremental. But for more-ambitious uses, the extra costs and likelihood of potential failures might make firms risk-averse. For example, a company that collects vast amounts of data from sensors to inform disaster relief and recovery might look to quantum computers to process information more quickly, to help save lives. But the first such computers might be more prone to faults and errors than are digital ones, with potentially grave consequences for life-critical operations. Such companies might therefore be put off from using quantum computers, until they are more reliable.

These computers will also need to be networked with digital computers, and integrating two such different technologies will be difficult and expensive. Firms will still need digital computers to perform everyday tasks and computations; they will use quantum computers to solve more-complex and specialist problems. Yet, developing hybrid protocols and programs that can work in both situations is much harder than it was to program digital computers in the 1970s.

Hybrid systems will need to be fluent in both digital bits and quantum qubits, and able to encode classical data into quantum states and vice versa. They will need converters to translate digital and analogue signals to transfer information between the two types of processing unit4. Quantum computers are generally large and might need to be cryogenically cooled, making it unlikely that many companies will have a machine of their own. Many will buy services remotely in the cloud through the Internet, for example sourcing extra computing power for simulating materials. Some users, such as traders in financial markets, in which millisecond timing is crucial, might need to host both types of computer.

A chip for quantum computing is tested with a laser at a laboratory of the manufacturing company Q.ANT in Stuttgart, Germany.Credit: Thomas Kienzle/AFP via Getty

To bring firms on board quickly, the commercial advantages will need to be demonstrated in practice. For this, government funding will be needed to attract private investment. We suggest this could be framed as a mission to help companies apply quantum computing to industrial and societal grand challenges. For example, for weather forecasting, quantum systems could analyse huge amounts of data to keep up with rapidly changing conditions. The resilience of the financial system could be improved through better modelling of markets, as would the development of low-carbon technologies to address climate change, such as catalysts for carbon capture or electrolytes for batteries.

Economists will need to devise a framework for evaluating the financial benefits of quantum computing, to encourage firms to invest. Researchers should build proof-of-concept cases, starting by identifying areas in which quantum computers might outperform digital computers for societal grand challenges. Researchers should also set out what firms need to do to adopt quantum technologies, including how they might need to change their business models and practices, as well as working with others along their value chains.

Quantum technologies operate on principles that are often counterintuitive and outside the comfort zone of many engineers and business managers. For example, these technologies work probabilistically and dont seem to obey classical conceptions of cause and effect. According to some schools of thought, in the quantum world, human agency might influence outcomes5, meaning the person operating the computer might need to be considered as part of the system.

And, at present, theres no shared language among scientists, engineers and business managers around quantum computing. Misunderstandings and confusion create delays and therefore further costs. Managers and engineers will need to know enough to be able to select the right class of problems for quantum computers, know what type of information is required to solve them, and prepare data in a quantum-ready format (see go.nature.com/3opfsap).

For example, a delivery logistics company might wish to reschedule its vehicle routes more rapidly to respond better to customer demand for pickups of goods that need returning. Quantum computation could be effective for such replanning which involves solving a complex combinatorial problem in which one change has a knock-on effect on other areas of the business, such as inventory management and financing. But managers would need to be able to spot areas of advantage such as this and know what to do to implement quantum computing solutions.

IBM quantum computer passes calculation milestone

A common semantic and syntactic language for quantum computers needs to be developed. It should be similar to the standardized Unified Modeling Language used for digital computer programming a visual language that helps software developers and engineers to build models to track the steps and actions involved in business processes. Such a tool reduces the costs of software development by making the process intuitive for business managers. Quantum computers also require algorithms and data structures, yet quantum information is much richer than classical information and more challenging to store, transmit and receive6.

A quantum unified modelling language that is similar to the classical one but can also work with quantum information will enable scientists, engineers and managers to stay on the same page while they discuss prototypes, test beds, road maps, simulation models and hybrid information-technology architectures7. Design toolkits that consist of reusable templates and guidelines, containing standard modules for hardware and software development, will allow users to innovate for themselves, shortening development times.

Some of this is beginning to happen. For example, modular workflows are emerging that enable computational chemists and algorithm developers to customize and control chemistry experiments using early versions of quantum computing platforms. A more concerted approach to standardize the language across application areas and hardware platforms is needed to foster commercialization.

Strategies for communicating about quantum computing with the public are also needed, to build trust in these new technologies and ensure that benefits accrue to all parts of society in a responsible manner. Scientists, policymakers and communications specialists should work together to create narratives around the usefulness of quantum technologies. They should focus on practical problems that can be solved rather than tales of weird quantum behaviour.

Although some such initiatives are being set up as part of national quantum programmes, more research is needed to better understand how cognitive biases and ways of learning might influence the adoption of quantum computing. For example, how were cognitive barriers overcome in adopting digital computers and nanotechnologies? Answers to questions such as this will help researchers to develop communication protocols and toolkits.

Quantum computing threatens to break a widely used protocol for encrypting information. Today, sensitive data are typically encrypted by using digital keys in the form of factors for large prime numbers, and sent through fibre-optic cables and other channels as classical bits streams of electrical and optical pulses representing 1s and 0s. The encryption relies on the inability of classical computers to compute the factors for the prime numbers in a reasonable time. However, quantum computers could in principle work out these factors faster and therefore break the encryption.

Are quantum computers about to break online privacy?

Addressing this risk will bring further costs. To protect the security of data and communications, firms will need to invest in new mathematical approaches for encryption, or use quantum-based communications systems, such as quantum key distribution. Quantum key distribution uses qubits sent either through fibre-optic cables or free space (through air, vacuum or outer space), to randomize the generation of keys between the sender and receiver using the probabilistic principles of quantum mechanics. Because of the fragile nature of qubits, if a hacker tries to observe them in transit, the quantum state is affected and the sender and receiver will know that it was tampered with.

Such a threat to sensitive government data and communications8 could also raise geopolitical issues and lead to export controls, such as those imposed by the United States and the Netherlands on microprocessors. The technology bottlenecks for quantum computing are unclear because there are several types of machine that rely on different components and therefore different supply chains. Such restrictions could stifle innovation, increase costs and disrupt the global nature of design, testing and manufacturing processes. Limited exchange of ideas and access to new prototypes would influence the eventual nature of commercial systems and supply chains, as they did for early video cassette recorders reliant on formats such as Betamax and VHS.

Integrating quantum computers and quantum communications technologies across a coordinated network to build a quantum internet9 could overcome this security threat and spur growth across many industries, as the creation of the Internet did. The quantum internet is a network that connects remote quantum devices through a combination of quantum and classical links. This allows distributed quantum computing, in which many devices work together to solve problems, further speeding up computations.

Office workers using computers and telephone headsets in 1965.Credit: Authenticated News/Archive Photos/Getty

The quantum internet could also enable new business models. For example, distributed quantum computers and a process known as blind quantum computing10, which allows fully private computation, could enhance machine learning while preserving proprietary data and guaranteeing that shared data are deleted after computation. Blind quantum computing would, for example, enable data or code from 3D-printing machines at a factory owned by one firm to be shared with machines at another firms factory without either firm seeing the details of the others processes. This would allow the creation and optimization of networks of factories owned by various firms to better cater for changes in product volume. Companies could offer unused 3D-printing production capacity to others, to increase efficiencies, localize production and add flexibility to supply chains.

Researchers need to determine the benefits to customers and firms of sharing data and information with faster computation, enhanced privacy and confidentiality. Would these benefits lead to more products and services that are better tailored to customer needs? What would the impacts be on the wider industrial landscape, and what new business models might emerge?

The promise of quantum computing is great if researchers can help to smooth the path for its implementation.

See the original post here:
How to introduce quantum computers without slowing economic ... - Nature.com

Read More..

Crypto survey finds 47% of investors expect Ethereum to ‘surpass’ Bitcoin – Cointelegraph

Fidelity Digital Assets released a Q2 2023 Signals Report on July 18, which claimed that Ethersoutlook for the next 12 months and the long term is positive. Year-to-date, Ether (ETH)has gained 62%, but while the investment firm might be short-term bullish on Ether, that does not mean it believes that the month-long bullish channel will be sustained.

While institutional investors like Fidelity Digital Assets may have a bullish longer-term vision for ETH's price, lets compare their analysis against network and market data to see if theyre on the money.

Beyond the technical indicators, the rationale behind Fidelitys bullish outlook for Ether is the networks higher burn rate versus coin issuance, the new address momentum and a growth in the number of network validators.

According to the Fidelity report, the net issuance since the Merge in September 2022 resulted in a net supply decrease of more than 700,000 Ether. Additionally, the analysts claim that Glassnode data showing an increasing number of Ethereum addresses that transacted for the first time ever proves healthy network adoption.

The report also points to a 15% increase in the number of active Ethereum validators in the second quarter.

The expectation around EIP-1153 is also building momentum for the Ethereum network, as the transient storage opcode improves smart contract efficiency, reduces costs and amplifies the Ethereum Virtual Machine design. The change is especially meaningful for decentralized exchanges (DEXs), where Ethereums dominance declined to 46% from 60% six months prior, according to DefiLlama data.

Another potentially bullish factor for the Ethereum network is the anticipated upgrade on the leading DEX, Uniswap. According to a July 17 presentation at the Ethereum Community Conference, the upcoming Uniswap v4 will allow users to build unlimited types of pools using programmable buttons (hooks), native ETH support and a singleton contract that performs internal transactions before settling final balances.

The announcement fueled the likelihood that EIP-1153 will be included in the next Dencun upgrade, which triggered Slingshot and DeFi Pulse co-founder Scott Lewis.

If approved, the implementation will be vital for the Ethereum network to recoup the market share lost due to high gas fees, as the seven-day average transaction cost has been above $4 since February. Consequently, Ethereums total value locked has dropped to its lowest level since April 2020, at 13.55 million ETH, according to DefiLlama.

Moreover, decentralized application activity has dwindled, as shown by DappRadars unique active wallets 30-day data: Uniswap, minus 28%; 1inch Network, minus 14%; MetaMask Swap, minus 8%; and OpenSea, minus 5%. As a comparison, in the same period, BNB Smart Chains PancakeSwap gained 10%, and Polygons Uniswap users increased 8%.

Ether quarterly futures have been signaling unease among professional traders. Those fixed-month contracts typically trade at a 5% to 10% premium compared to spot markets to compensate for the delayed settlement, a situation known as contango.

According to data from Laevitas, the Ether three-month futures premium currently stands at 4%, which is below the neutral threshold and lower than the 5.5% level seen on July 14. This indicator is clear evidence that traders are less inclined to use leverage for bullish ETH positions.

More concerningly, Ethers 59% gains year-to-date might have caused investors to become overly optimistic. A recent survey from CryptoVantage of 1,000 North Americans that invested in cryptocurrencies over the past five years found that 46% named Ether as the top contender to surpass Bitcoin (BTC).

Related:Bitcoin rally will lead to "speculative blow-off top in 2024, Mark Yusko predicts

This is a somewhat startling point of view, but it could be misleading since the survey did not ask whether any coin would eventually flip Bitcoin, so respondents dont necessarily place strong odds on this outcome.

Fidelitys analysis has given valid reasons for why the firm is bullish on Ethers 12-month price performance, but in the shorter term, the recurrent high gas fees and lack of interest from leverage buyers signal increased odds of the Ether price breaking below the channel support.

This article is for general information purposes and is not intended to be and should not be taken as legal or investment advice. The views, thoughts, and opinions expressed here are the authors alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.

Continue reading here:

Crypto survey finds 47% of investors expect Ethereum to 'surpass' Bitcoin - Cointelegraph

Read More..