Showtime Management and international partner Selladoor Worldwide have postponed the South African tour of the We Will Rock You musical to 2022. South Africa is currently in its third wave of Covid-19 infections and, as such, the government has implemented precautions that only allows for a total audience of 100 people.
From East London to some of South Africa's most storied agencies. After winning on global stages and achieving what she set out to on the inside of the corporate advertising machinery, Leigh-Anne Salonika is living her purpose, and in doing so working with brands to unlock theirsByEvan-Lee Courie
The big difference between current (traditional) computers and quantum computers is that quantum computers could process information much faster. Processing that will take traditional computers years to perform could theoretically be completed by a quantum computer in a matter of hours.
Photo by Anna Shvets from Pexels
Cybercriminals make their living by attacking businesses and people around the world. Technologies such as quantum computers can create an opportunity for cybercriminals to execute even more catastrophic cyberattacks.
Fortunately, Public Key Infrastructure (PKI) can secure organisations. As long as cybercriminals do not know what your keys - encryption and/or decryption - are, your data is safe. However, quantum computing can change that.
For example, in cybersecurity, there is a cyberattack called a brute-force attack, where attackers can try to guess your key. By checking every possible value, the attacker would be able to guess your key eventually. However, with the current technology, to guess all possibilities for keys would take hundreds of years, which makes brute-force attacks impractical.
Since quantum computers will be much faster, they can, theoretically, guess an encryption and/or decryption key in a matter of hours.
Cybersecurity experts at Enhalo, a full-circle cyber defence group, offer seven steps to keep your SME cyber safe in 2021...
24 Mar 2021
There is still much speculation about what the post-quantum world would be like, but organisations can start preparing for when the inevitable comes.
Even though readily available quantum computers are still in the distant future, organisations can start thinking about their strategy to become more crypto agile. To prepare for the world of quantum computing, organisations can:
Create a crypto inventory. A list of cryptographic algorithms in use will help organisations identify vulnerable algorithms and migrate them to quantum-resistant algorithms when it becomes necessary.
Start building your systems with crypto agility in mind. For example, when applying digital signatures use PAdES (PDF Advanced Electronic Signatures) compliant standards that will allow you to re-timestamp your documents with quantum-resistant algorithms.
Ask your third-party platform providers what they are doing to prepare for the post-quantum world.
About the author
Riaan de Villiers is a cybersecurity expert and business analyst at LAWTrust.
LEGAL DISCLAIMER: This Message Board accepts no liability of legal consequences that arise from the Message Boards (e.g. defamation, slander, or other such crimes). All posted messages are the sole property of their respective authors. The maintainer does retain the right to remove any message posts for whatever reasons. People that post messages to this forum are not to libel/slander nor in any other way depict a company, entity, individual(s), or service in a false light; should they do so, the legal consequences are theirs alone. Bizcommunity.com will disclose authors' IP addresses to authorities if compelled to do so by a court of law.