quantum computing

The quantum threat: Implications for the Internet of Things

With an estimated 43 billion Internet of Things (IoT) devices expected to be in use globally in 2023, their security is growing in importance across a wide range of sectors. As IoT devices generate and exchange data, we depend on that data to be accurate and reliable. In addition, because they are networked, their exploitation…

The quantum threat: Implications for the Internet of Things Read More »

Hybrid quantum workflow offers potential for hydrogen fuel cell efficiency

Researchers from Airbus and BMW have used Quantinuum’s H-series hardware and InQuanto quantum chemistry software to study catalysed oxidation reduction reaction, one of the most basic electrochemical processes. The research said that a hybrid quantum-classical workflow could speed up future research using quantum computers to simulate quantum systems, focusing on the chemical reactions of catalysts…

Hybrid quantum workflow offers potential for hydrogen fuel cell efficiency Read More »

Hello ChatGPT, RIP software developer?

This year has seen a remarkable explosion of interest in generative AI. Go back just six months, and most people had never heard of it. Now, it seems as though everyone – from tech professionals to students – is using it and experimenting, in particular, with the “poster child” ChatGPT. This has also generated increasing…

Hello ChatGPT, RIP software developer? Read More »

Handbook helps Dutch organisations migrate to quantum-safe communication

Cryptography forms an essential part of organisations’ information security and is indispensable for preventing the theft of sensitive data, verifying that received data is correct, and preventing unauthorised access to systems.   With the rise of quantum computers, current cryptographic standards are no longer adequate, says Marc Stevens, senior researcher in the Cryptology research group at the Dutch Centrum…

Handbook helps Dutch organisations migrate to quantum-safe communication Read More »

Future Cyber Threats: The four ‘horsemen of the apocalypse’

As a CISO and cyber specialist, I am often asked what I see as the big cyber threats of the future. Whilst I’m not a fan of crystal ball gazing for its own sake, nevertheless it can be helpful to think about what may be coming – and what we can do about it. So…

Future Cyber Threats: The four ‘horsemen of the apocalypse’ Read More »

Prepare for quantum to fundamentally change PKI effectiveness

Encryption is a fundamental aspect of Public Key Infrastructure (PKI) – a service used to confirm identity by proving ownership of a private key. Encryption plays a crucial role in this process, ensuring the confidentiality and integrity of data to build confidence that senders and receivers of information are who they say they are. However,…

Prepare for quantum to fundamentally change PKI effectiveness Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top