Remove Security Remove Technology Remove Telecommunications Remove Weak Development Team
article thumbnail

Mastercard preps for the post-quantum cybersecurity threat

CIO

The billions of transactions we conduct online today are protected by what are called public-key encryption technologies. Such a cryptographically relevant quantum computer (CRQC) could deliver a devastating impact to global cybersecurity protocols. Toshiba and ID Quantique were used to produce the keys. And it was successful.

Security 347
article thumbnail

The Telecommunications Service Provider Journey – From Telco to Techco

Cloudera

Earlier this month, the multi-national carrier MTN announced a rebranding, and along with its logo refresh, announced that it was moving to focus on being a technology provider. The boundary between technology and business was disappearing, the group agreed: is there a new discipline of DevSecOps, or BusOps emerging? .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What makes a CIO truly great?

CIO

Anthony Sheldon, longtime chronicler of the leadership strengths and weaknesses of British Prime Ministers ( Johnson at 10: The Inside Story ), concludes that what makes leaders followable is being “able to tell a story of where they have come from and to where they will lead us.” Another possible adjective for our list.

article thumbnail

Cybersecurity Snapshot: 6 Things That Matter Right Now

Tenable

26 | The “platformization” of hybrid cloud security. Tackling IT/OT cybersecurity challenges. Tips for complying with HIPAA’s cybersecurity rule. 1 - IDC sees shift to “platformization” of hybrid cloud security. That’s according to IDC’s “Worldwide Cloud Workload Security Forecast, 2022-2026.” . And much more!

article thumbnail

The UK’s National Cyber Strategy 2022 – An Evolution

Palo Alto Networks

The UK Government has once again shifted the cyber discourse with the recent publication of the National Cyber Strategy 2022 , marking a significant change in how the government views cybersecurity and solidifying its position as a global cyber power. Building Resilience and Securing the Digital Ecosystem. A Whole of Society Approach.

article thumbnail

Fraport goes all in on private 5G network

CIO

Or as Fraport SVP of IT infrastructure Fritz Oswald puts it: “We definitely see 5G as a key technology for digitalization.” And according to Oswald, it’s difficult to adequately illuminate the airport’s large open spaces with the WLAN technology used up to now. “In The new technology also had another consequence. in Germany.

Network 264
article thumbnail

Top Digital Transformations Ruling Mobile App Development in 2021

Xicom

Over the past few years, the discussions about the next year’s digital revolutions have been a call to repetition: Augmented Reality, Internet of Things, Edge Compute, Cloud technologies and the list goes on. Also read : A QUICK GUIDE TO HELP YOU WITH SOFTWARE DEVELOPMENT COMPANY. What does this hold for 2021? Only time will tell!

Mobile 98