Category: IDQ Blog


The Case for Strong Encryption Keys

The strength of any cryptographic system lies in its keys – the random stream of bits used by the cryptographic algorithm to transform plain text into cypher text and back again. Recently, the strength of these keys – particularly those used in PKI –

Read More »

Data owners still failing to get to grips with encryption

In its 2016 Breach Level Index report, Gemalto revealed that 1,792 breach incidents took place worldwide, affecting more than 1.3 billion records. This equates to over three million records being lost or stolen every day last year and brings the total number of records

Read More »

2016: Year of the Political Hack

The 2016 technology news headlines have been dominated by data breach notifications which is no exception; however, the nature of the attacks have been more disturbing.

Read More »

UK Government clarifies position on quantum technologies

In a recent publication, the UK Government Office for Science highlights the opportunities presented by the emerging field of quantum technologies. The Quantum Age: Technological Opportunities recognizes the global effort to commercialize quantum science, moving it out of the laboratory and into viable real-world

Read More »

Decoding the GDPR

If the last 5 years has taught us anything, it is that data breaches are inevitable. Users still make errors, systems are still vulnerable and cyber-criminals’ hunger for hacking shows no sign of being sated. It would be wrong to say that all data

Read More »
Quantum State

Dawn of the Quantum Computing Era

If technology has taught us anything, it's that the speed of change is unpredictable. A period of sustained innovation in the field of quantum computing has seen timelines for development getting shorter; with some experts predicting definitive results as soon as 2018.

Read More »

Predictability is the enemy of security

In a recent IDG Network World article, author Lucian Constantin points to research by the University of Pennsylvania, INRIA, CNRS and Universite de Lorraine that exposes a serious implementation weakness in public key cryptography.

Read More »
Cloud computing and computer networking concept

What is the key to data centre security?

In a truly connected world, organisations of all types are becoming increasingly dependent upon cloud and data centre service providers to facilitate everyday business operations. Inherent in this relationship is the trust that our business critical data is secure, both at rest and when

Read More »
In this photo released by China's Xinhua News Agency, a Long March-2D rocket carrying the world's first quantum satellite lifts off from the Jiuquan Satellite Launch Center in Jiuquan, northwestern China's Gansu Province, early Tuesday, Aug. 16, 2016. Experts say China's launch of the first quantum satellite will push forward the worldwide effort to develop the ability to send communications that are impenetrable by hackers. (Jin Liwang/Xinhua via AP)

The Quantum Space Race Begins

China has officially kicked off the quantum space race, becoming the first country to launch a satellite designed for highly secure quantum communications. The 600kg Micius satellite, was launched from the Gobi desert on 16th August on a two year mission to help China

Read More »