#MIWIC2024: Jennifer Fernick, Senior Staff Security Engineer, Encryption Lead, Google
IT Security Guru » Cryptography
by Charley Nash
3w ago
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected by an esteemed panel of judges. Presented in a Q&A format, the nominee’s answers are written in their own words with minor edits made by the editor for readability and where relevant, supplemented with additional commentary by their nominator. In 2024, the awards were sponsored by BT, Think Cybersecurity Ltd. and Plexal ..read more
Visit website
Can Paying in Cryptocurrency Keep Your Data Safe?
IT Security Guru » Cryptography
by The Gurus
1M ago
We have witnessed cryptocurrency’s rise from speculation to popularity because of the many benefits it offers and the financial gaps it has managed to fill in many industries, including finance, retail, entertainment, and many more. Some of the most commended benefits are the increased security and privacy that cryptocurrency use offers as compared to traditional forms of payment.  In this article, we will look at the ways in which cryptocurrency transactions can protect your sensitive information. 1. Secure Payment Processing In the period between 2020 and 2022, there was an increased ri ..read more
Visit website
Meet This Year’s Most Inspiring Women in Cyber Nominees: Part 2
IT Security Guru » Cryptography
by Charley Nash
2M ago
The nominations for the Most Inspiring Women in Cyber awards are out! It’s always wonderful to read about the incredible women in our industry, who are making fantastic contributions and paving the way for others. This year we had so many exceptional nominees. MIWIC24 is sponsored by ThinkCyber, BT and Plexal, in partnership with WiCyS UK & Ireland Affiliate, Assured Intelligence, and the IT Security Guru. It is hosted by Eskenzi PR. In no particular order, here is PART 2 of the 2024 shortlist along with snippets of what their nominators had to say about them! Nikki Robinson, STSM/Lead Sec ..read more
Visit website
Meet This Year’s Most Inspiring Women in Cyber Nominees: Part 3
IT Security Guru » Cryptography
by Charley Nash
2M ago
The nominations for the Most Inspiring Women in Cyber awards are out! It’s always wonderful to read about the incredible women in our industry, who are making fantastic contributions and paving the way for others. This year we had so many exceptional nominees. MIWIC24 is sponsored by ThinkCyber, BT and Plexal, in partnership with WiCyS UK & Ireland Affiliate, Assured Intelligence, and the IT Security Guru. It is hosted by Eskenzi PR. In no particular order, here is PART 3 of the 2024 shortlist along with snippets of what their nominators had to say about them! Katherine Hutton, Product Man ..read more
Visit website
Quantum computing: The data security conundrum
IT Security Guru » Cryptography
by The Gurus
2M ago
One of the biggest challenges of digital technology today is around security systems and data. In response to this, sophisticated algorithms have been designed to encrypt data and protect it through frameworks known as symmetric cryptography. While this has proven successful, advancements in quantum computing – which utilises quantum mechanics to solve complex problems faster than conventional computers – could potentially turn data security on its head. IBM, Microsoft and Google have already turned their attention to quantum computing and, as a result, commercially viable quantum computers ar ..read more
Visit website
Record number of schoolgirls and cyber specialists to gather amid UK digital skills crisis
IT Security Guru » Cryptography
by The Gurus
6M ago
On 17th November a record number of Year 8 schoolgirls, government cyber specialists and business leaders will gather at one the UK’s leading cyber hotspots, for what will be the largest ever cybersecurity workshop in the UK. Now in its third year and hosted by the UK’s largest non-profit cybersecurity cluster, CyNam, this year’s #EmPowerCyber2023 event will be the biggest yet to inspire females to pursue a career in cyber. A thousand Year 8 schoolgirls from 29 schools from across the South West region will be attending the event at a location near GCHQ, as the government declares a digital sk ..read more
Visit website
The Future of Encryption: Navigating Change with Crypto-Agility
IT Security Guru » Cryptography
by The Gurus
6M ago
“Agility” has been quite a buzzword recently. You will likely find it on most companies’ 5-year plan slide decks. Yet, there is one area where the ability to adapt quickly and efficiently makes a lot of sense -cryptography. In an age where the methods employed by cyber attackers are becoming increasingly sophisticated and the specter of quantum computing looms, the importance of encryption cannot be overstated. This has led to the rise of a concept enabled by technical capabilities, known as “crypto-agility,” or the ability to quickly adapt to an alternative cryptographic standard without maki ..read more
Visit website
Crack the Code: How to Secure Your Dream Cybersecurity Career
IT Security Guru » Cryptography
by Daniel Tannenbaum
10M ago
With cyber threats constantly dominating headlines, the draw of a career in cybersecurity has never been higher for young professionals.  The huge increase in cyberattacks across various sectors has fuelled a demand for skilled individuals who can safeguard data for businesses.  According to Glassdoor, the national average salary for a Cyber Security professional in the UK is around £43,711 per year. To embark on this exciting journey, it is essential to understand the qualifications and skills required to excel in the industry.   Degrees Paving the Path A degree often acts as a ..read more
Visit website
MIRACL Trust ID Branded ‘an authentication solution that lives up to its name’ by financial services industry analysts Celent
IT Security Guru » Cryptography
by Guru's
1y ago
 MIRACL, a single-step, multi-factor authentication provider have been given a gowing review in a CELENT Solution Report into their offering. Compiled by Zil Bareisis in July of this year, the report opens with the admission that ‘over the years, industry analysts have learned to take some vendor claims with a grain of salt’. Celent goes on to point out ‘…we were positively surprised to find that MIRACL Trust ID is a solution that lives up to its name’.  When pressed on the specific benefits of the product for financial services, CELENT cites:  Usability: MIRACL Trust ID is int ..read more
Visit website
MIRACL is One Cybersecurity Company to Watch in 2022
IT Security Guru » Cryptography
by Cole Aungle
1y ago
Passwords are traditional. As long as only you and the people you trust know them then, you can operate anonymously and with security on the Internet and various applications. Passwords are safe. Well not really. Not anymore.     Passwords are reused. They are successful for months, years even. Yet, the reliance on a singular method of authentication is foolhardy. If something can go wrong, it will. Eventually, a data breach reveals a password and it opens the door for a range of potential attack vectors. A compromised password is the most likely way that someone will get hacked ..read more
Visit website

Follow IT Security Guru » Cryptography on FeedSpot

Continue with Google
Continue with Apple
OR