logo
episode-header-image
Sep 2022
12m 43s

How to Protect your Data in the Quantum ...

Gautam Siwach
About this episode

Podcast with Gautam Siwach and Jin Vanstee !

Speaker - Thomas Harrer , Thomas is an IBM distinguished engineer and CTO for server storage in Europe, Middle East and Africa. His experience is around Hybrid Cloud & AI Platform, Infrastructure for mission critical systems, Cyber Resilience, Data, IT architecture, IT infrastructure, IBM Systems, Server & Storage,Service Management, Methods, Video, Communications.

  • Why is cryptography so important for our economy and our life?

  • Is the existing cryptography still secure enough for all time in the future?

  • How to mitigate this severe risk from eventually broken crypto protocols?

Up next
Oct 2022
What is Cyber Security Vs Cyber Resiliency ?
Podcast with Gautam Siwach and Jin Vanstee !Speaker - Christopher Vollmar, Principal, World Wide Storage Data Resiliency ArchitectChristopher is an IBM Certified IT Specialist (Level 3 Thought Leader) and Storage Architect. He is focused on helping customers design solutions to s ... Show More
13m 9s
Oct 2022
Why is Open Shift important for application modernization ?
Podcast with Gautam Siwach and Jin Vanstee !Speaker - Daniel joined IBM in 2004 to work with Linux and then diversified to other Unix platforms, like Solaris, HP-UX and IBM AIX. In 2007, Daniel was responsible for configuring and secure the first Cloud Environment at IBM when we ... Show More
8m 35s
Sep 2022
How has emerging technology impacted University Education ?
Podcast with Gautam Siwach and Jin Vanstee !Speaker - Dr. Ron Harichandran, Ron Harichandran was appointed Dean of the Tagliatela College of Engineering at the University of New Haven in August 2011. In April 2019 he was also named Vice Provost for Research. Prior to that he was ... Show More
15m 7s
Recommended Episodes
Aug 2023
Quantum computing: A threat to asymmetric encryption.
Rick Howard, the CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the meaning of quantum computing through a cybersecurity perspective with CyberWire Hash Table guests Dr. Georgian Shea, Chief Technologist at the Foundation for Defense of Democracies, and Jonathan Fr ... Show More
17m 33s
Jul 2022
The cost of a data breach as an economic drag. Personal apps as a potential business risk. Why so little ransomware in Ukraine? Employee engagement study reaches predictably glum conclusions.
IBM reports on the cost of a data breach. Personal apps as a potential business risk. Over on the dark side, there’s help wanted in the C2C labor market. An employee engagement study reaches predictably glum conclusions. Betsy Carmelite from Booz Allen Hamilton on reducing softwa ... Show More
25m 18s
Jul 2021
Analyzing the Impact of A.I. and Technology on Society and Cybersecurity
Technology is advancing at pace never seen before and the newest tech, applications and widgets are being widely adopted at an even quicker rate. Just look at A.I. and machine learning tools,which are now used to identify things once thought unimaginable — whether it's to figure ... Show More
49m 58s
Dec 2022
Machine learning is physics (Ep. 211)
What if we borrowed from physics some theories that would interpret deep learning and machine learning in general? Here is a list of plausible ways to interpret our beloved ML models and understand why they works, or they don't. Enjoy the show! Our Sponsors NordPass Business has ... Show More
23m 54s
Mar 2023
The quantum revolution: Q-Day
In the cybersecurity world they call it Q-Day, the day when a quantum computer will be built that can break the encryption of the internet. John Thornhill and Madhumita Murgia speak to cybersecurity expert and former professional hacker Mark Carney about password cracking, and wh ... Show More
26m 4s
Jun 2021
Diplomatic Backdoor targets charities, embassies, and telcos in Europe, Africa, and Southwest Asia. Fancy Lazarus and DDoS extortion. Slilpp credential market takedown. A data gap? Cyber regulation.
Diplomatic Backdoor afflicts Africa, Europe, and Southwest Asia. Electronic Arts source code stolen. “Fancy Lazarus” is back: despite the name, it’s an extortion gang, not an espionage service. An international law enforcement action takes down a credential market. Making good da ... Show More
26m 56s
Sep 2023
Agent Tesla still hits unpatched systems. Hot wallet hacks. AI and DevSecOps. Notes on Fancy Bear and NoName057(16). And some curious trends in the cyber labor market.
There’s a new Agent Tesla variant. Lost credentials and crypto wallet hacks. Tension between DevSecOps and AI. Fancy Bear makes an attempt on Ukrainian energy infrastructure. A look at NoName057(16). Tim Starks from the Washington Post's Cybersecurity 202. Simone Petrella and Hel ... Show More
31m 23s
Aug 2023
2481: Zenoss - From Cloud to AI: The Evolution of IT Infrastructure
In today's episode of Tech Talks Daily, I sit down with Trent Fitz, a seasoned veteran in the tech space with over two decades of leadership experience, especially in cloud computing, AI, and cybersecurity. As Chief Product Officer of Zenoss, Trent has been at the forefront of te ... Show More
27m 4s
Oct 2018
Influence operations, da. Direct hacking? Maybe nyet. Chalubo botnet borrows old tricks. Financial sector alert in Mexico. Airline breach disclosed. Lawsuits over privacy. ICS Security notes.
In today's podcast, we hear that the US Department of Homeland Security sees lower-than-expected rates of Russian election system probing even as Russian information operations continue. Sophos warns of the emergence of the Linux-based "Chalubo" botnet. Mexico's Central Bank rais ... Show More
20m 12s