TECHNOLOGY > Key Areas > Quantum Computing


« Back to News

2022-03-09

NATO Tests A Post-Quantum VPN

Post-Quantum technology provides different powerful algorithms to ensure security, even when facing attackers using quantum computing.

2021-03-25

China Plans For Supremacy In AI & Quantum Computing

China's latest five-year plan stands out for its emphasis on advanced technologies and innovation as it aims for supremacy in key sectors.

2020-06-30

Quantum Computing Will Have A Revolutionary Effect

Quantum computing will combine with IoT and AI to create a secure new network of digital and physical devices that will revolutionise industry.

2020-05-12

Quantum Science Will Revolutionise Security

Quantum computing is predicted to transform scientific research, stock market prediction and cryptography, a key component of cybersecurity.

2020-05-01

Quantum Computing Has Far Reaching Effects On Security

Quantum computers are capable of code-breaking applications that could pose major risks to the security of current communications systems.

2020-04-17

Quantum Computing, Hackers & The Internet of Things

Quantum computing is still in its development stage but its potential to enable interaction between humans and the IoT is uniquely powerful.

2019-12-03

US & China Are Investing Big In Quantum Computing Simulation

Quantum simulators permit the study of quantum systems that are difficult to study in the laboratory and impossible to model with a supercomputer.

2019-10-30

Google Claims Quantum Supremacy

The race to build the world's first useful quantum computer is nearing its end. Google are claiming victory over IBM. Why is that important?

2019-04-15

The Quantum Computer Threat To Encryption Should Be Taken Seriously

The advanced capabilities of quantum computers will render most traditional encryption protocols used today obsolete.

2019-04-01

Quantum Computing Will Break Encryption

Modern public-key encryption techniques will soon be challenged by rapid advances in Quantum computing.

2019-01-16

Quantum Computing Will Overtake Conventional Computing

Conventional computers are reaching their limit. Quantum computers, which calculate using quantum phenomena are the replacement.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

SecureDevice

SecureDevice

SecureDevice is a Danish IT Security company.

DefCamp

DefCamp

DefCamp is the most important annual conference on Hacking & Information Security in Central Eastern Europe.

Steganos

Steganos

Steganos offers highly secure and easy to use software tools that protect and secure on and offline data.

Lexsynergy

Lexsynergy

Lexsynergy is a global domain name management and online brand protection company.

IP2Location

IP2Location

IP2Location provide services to identify geolocation by IP address, and to detect IP addresses associated with anonymous proxy servers, which are often used for fraud and spamming purposes.

VirtualArmour

VirtualArmour

VirtualArmour is a managed security services provider with global reach and local attitude.

Stratia Cyber

Stratia Cyber

Stratia Cyber is an independent, technology agnostic company providing high quality, pragmatic cyber security consultancy and expertise.

TokenEx

TokenEx

TokenEx Cloud Security Platform protects sensitive data to strengthen our clients' security postures while future-proofing their operations.

Nasuni

Nasuni

The Nasuni File Data Platform offers the protection, detection, and recovery of file shares from ransomware attacks or random disasters within minutes.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

Carahsoft Technology Corp

Carahsoft Technology Corp

Carahsoft Technology is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets.

aFFirmFirst

aFFirmFirst

aFFirmFirst is a unique software solution offering a simple yet effective way for businesses to protect and control their online images and logo, as well as allowing one-click website verification.

NeuroID

NeuroID

NeuroID combines the power of industry-leading behavioral analytics with advanced device and network intelligence to create your first line of defense against malicious bots, bad actors, and fraud.

EyBrids

EyBrids

As a forward-thinking cybersecurity consulting firm, we believe that robust security is the foundation for innovation and growth in today’s digital landscape.

ThreatMon

ThreatMon

Gain insights into emerging threats with real-time data and AI-driven analysis to stay ahead of cyber risks. Detect, analyze, and respond to threats before they happen.