Preparing for the day quantum computing cracks public-key cryptography: What to do now

Email not displaying correctly? View it in your browser.

IDG’s Top Enterprise Stories

Our top picks from IDG's editors
Aug 08, 2018
IDG
Featured Image
INSIDER

Trip Prep 101: Taking the anxiety out of business travel

You can’t take it all with you, but you can find slimmer options for most of the essentials. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Preparing for the day quantum computing cracks public-key cryptography: What to do now
When it comes to databases, why ‘I can’t quit you, baby’
Data in, intelligence out: Machine learning pipelines demystified
Julia tutorial: Get started with the Julia language
Inside Dropbox and Microsoft Office phishing attacks
What is an agile coach? A valuable role for organizational change
Reskilling IT for the AI era

White Paper: Hitachi ID Systems, Inc.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More

Thumbnail Image
INSIDER

Preparing for the day quantum computing cracks public-key cryptography: What to do now

Quantum computers could crack public-key encryption in as little as five years. Here's how to prepare for the post-quantum world. Read More

Thumbnail Image
INSIDER

When it comes to databases, why ‘I can’t quit you, baby’

Leaving legacy RDMSs is hard, but eventually enterprises will break free of Oracle’s and others’ last grip on their data infrastructure Read More

Thumbnail Image
INSIDER

Data in, intelligence out: Machine learning pipelines demystified

Data plus algorithms equals machine learning, but how does that all unfold? Let’s lift the lid on the way those pieces fit together, beginning to end Read More

Thumbnail Image
INSIDER

Julia tutorial: Get started with the Julia language

Want the convenience of a dynamic language and the performance of a compiled statically typed language? Try Julia Read More

Thumbnail Image

Inside Dropbox and Microsoft Office phishing attacks

Today on Salted Hash, we're going to look at a phishing attack that targeted me directly. It's got a few interesting elements, including a weak attempt to spoof an HTTPS connection, and a sort of hybrid lure, which starts as Dropbox but ends at Microsoft Office. Read More

Thumbnail Image

What is an agile coach? A valuable role for organizational change

An agile coach helps organizations implement the agile methodology by developing agile teams and facilitating the organizational culture change necessary for sustained agile success. Read More

Thumbnail Image
INSIDER

Reskilling IT for the AI era

AI expertise is in short supply and high demand. Here’s how companies are filling the gap by training staff on the skills necessary to make the most of artificial intelligence. Read More

White Paper: Bronze Drum Consulting

How Powerful New Technologies are Powering a Real-Time Revolution in Capital Markets

Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More

Get more from the experts at these enterprise websites from IDG:

CIO | Computerworld | CSO | InfoWorld | Network World

You are currently subscribed to IDG’s Top Enterprise Stories as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Privacy Policy

Learn more about INSIDER

Copyright © 2018 IDG Communications, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.