• Believe the Hype About Quantum Security: Report
    www.technewsworld.com
    Believe the Hype About Quantum Security: ReportBy John P. Mello Jr.March 11, 2025 5:00 AM PT ADVERTISEMENTAchieve Financial Clarity with SettleGetting accurate product cost data is crucial for growth. Settle unifies invoices, payments, and inventory to help e-commerce operators uncover true costs and boost margins -- all in one platform. Get Started Today! A call for organizations to take quantum security seriously has been sounded in a new report by Forrester Research.The report titled Quantum Security Isnt Hype Every Security Leader Needs It acknowledged that the commercial availability of quantum computers that can crack traditional asymmetric cryptography is still five to 10 years away. However, it added that organizations must assess and prepare for the impact of quantum security now.While the encryption market has a history of vendors publishing incredible claims like unbreakable encryption, the hype and interest around quantum is real because hackers are already using the harvest now, decrypt later approach, noted the report written by research director Merritt Maxim and analysts Andras Cser, Sandy Carielli, and Heidi Shey.Organizations need to start preparing now to secure their resources from attacks from quantum computers since it will take them years to do it because the transition wont be totally under their control, explained Carielli. Theres a lot of reliance on third parties, she told TechNewsWorld, and reliance on vendors upgrading their technology so you can upgrade yours.There are a lot of steps along the way, she continued, so I think youre talking in terms of numbers of years, and thats why weve always been saying start now, even if this is not something that will come into play for another five or 10 or whatever years. It will potentially take that long to complete the migration.Harvest Now, Decrypt LaterJamie Boote, associate principal security consultant at Black Duck Software, an applications security company in Burlington, Mass., asserted that quantum computing would disrupt decades-old conventions in terms of how well current encryption algorithms can safeguard sensitive data.An entire generation of professionals has lived with the slow cycling of encryption algorithms in and out as computers grew faster at a predictable rate, and this is going to throw that cadence away, he told TechNewsWorld. This change isnt going to be instant, and its not going to be easy, but the more we can prepare our infrastructure to just work in the post-quantum computing era, the fewer incidents stemming from unmaintained or older components will occur.Theres a saying that The best time to plant a shade tree was twenty years ago, the second-best time is today, but right now, were living at a point where it is the best time to plant that metaphorical shade tree of security to enjoy the benefits when the time is right, he added.Organizations should also be getting their quantum security efforts into gear because harvest now, decrypt efforts are being conducted by nation-states and cybercriminals. Industries that have data that needs to remain private for years into the future are at most risk of harvest now, decrypt later, explained Rebecca Krauthamer, co-founder and CEO of QuSecure, a maker of quantum-safe security solutions, in San Mateo, Calif.When it comes to data like national security information, bank account information, data thats valuable year after year when a quantum computer does come online, it can decrypt that stockpiled data, she told TechNewsWorld. Thats why we see governments and banks moving very quickly to start addressing the quantum threat, even though there is no quantum computer that exists today that will break todays encryption.Valuable ExercisePreparing for Q-Day even if it never arrives can be an incredibly valuable exercise, maintained Richard Stiennon, founder and chief research analyst at IT-Harvest, a cybersecurity industry analyst firm in Birmingham, Mich.You should be doing it anyway, he told TechNewsWorld. You should be discovering all the places you have encrypted data. That will tell you where your family jewels are. And itll tell you the size and scope of problems youve got.Now youve probably got all this encrypted data all over the place, he said. You dont know who owns the keys or how to get to them. Theyre probably insecure. Theyre probably old and need to be re-keyed. So, you have to think about getting your hands around this, right? How do you find all the encrypted data? Find the way its encrypted so you can decrypt and re-encrypt it if you need to?When you talk to some end users, they dont know whats being protected by cryptography, added Heather West, senior research analyst at IDC, a market research company in Framingham, Mass. For some, its a mixture of different types of solutions, she told TechNewsWorld. Some have band-aid solutions. Some just dont know. So, you first need to understand what data and infrastructure are most at risk. Then you need to know what youre doing to protect it and figure out which post-quantum cryptography algorithms would be best suited for protecting it.However, Luigi Caramico, co-founder and CTO of DataKrypto, a cloud encryption company in Burlingame, Calif., warned against investing too much effort today in quantum-resistant solutions.An encryption method considered quantum-proof today may not remain secure in the future, he told TechNewsWorld. Instead, I would prioritize addressing present-day vulnerabilities, such as the encryption gap the need to decrypt when its in use which poses an immediate and tangible risk to data security.Investing heavily in todays quantum-proof solutions could also be risky, he added. Some of these algorithms may eventually be found vulnerable to classical attacks, let alone quantum ones. A better strategy is quantum agility ensuring cryptographic systems can be updated as stronger and more thoroughly vetted algorithms emerge.Quantum Security Demands Crypto-AgilityQuantum security and crypto-agility the ability to replace and upgrade cryptographic algorithms in infrastructure, commercial and in-house-built applications will improve the security of any information exchange, improve digital signatures, and mitigate the risk of harvest now, decrypt later attacks, the Forrester report noted.Quantum security will force an overhaul of systems across an organization, and organizations will need to upgrade their entire security stack to ensure crypto-agility for the future to protect their data, it added.Crypto-agility is crucial in todays fast-evolving digital environment, where new technologies, algorithms, and security challenges require constant adaptation, said Tim Callan, chief compliance officer at Sectigo, a global digital certificate provider. This need for agility will become even more critical as we approach the PQC [Post Quantum Computing] era, with the potential for rapid algorithm deprecation, he told TechNewsWorld.Because algorithmic trust is imperfect, organizations must use this opportunity to design security that is modular and enable algorithms to easily be swapped in and out like security Legos, Matt Mittelsteadt, a research fellow at the Cato Institute, a Washington, D.C., think tank, told TechNewsWorld.If any of these algorithms are found insecure, which is indeed possible, organizations that design with modularity in mind will be able to quickly swap in a replacement and maintain security, he said.Trillion-Dollar RiskThe Forrester report is exactly right about the threat of quantum computers, asserted Stefan Leichenauer, vice president of engineering at SandboxAQ, a developer of B2B and quantum software in Palo Alto, Calif.In as little as five years, we could see a quantum computer crack traditional cryptography, and because of hack now, decrypt later attacks, the vulnerability exists today, he told TechNewsWorld.Even if we have doubts about whether a quantum computer will arrive in that timeframe maybe you think its only a 10% chance a modest probability of a trillion-dollar-loss event is still a big problem, he said.Weve seen a number of recent announcements from the quantum computing industry showing that the roadmap is advancing, so our confidence that quantum computers are coming has only gone up, he added.Every organization needs to evaluate their cryptographic posture, which begins with a careful inventory of their use of encryption and then a crypto-agile migration to post-quantum key exchanges. Its a multi-year process, so the time to start is now.John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John.Leave a CommentClick here to cancel reply. Please sign in to post or reply to a comment. New users create a free account.Related StoriesMore by John P. Mello Jr.view allMore in Cybersecurity
    0 Comments ·0 Shares ·44 Views
  • How to Make a Realistic Interior in Blender (New Technique)
    www.youtube.com
    Learn how to Create a Realistic Interior in Blender using this New Technique Chapter Marks 00:00 - Intro00:21 - Reference02:21 - Modeling09:38 - Mood & Lighting22:54 - Texturing28:54 - Post-Processing34:26 - EndingIn this Blender tutorial, Ill show you how to create a stunning, photorealistic kitchen scene from start to finish using a brand-new technique! Whether you're a beginner or a seasoned 3D artist, this step-by-step guide will help you achieve professional-quality interior renders with realistic lighting, materials, and textures. Download the Fully Complete Scene: https://blendermarket.com/products/kitchen-scene--tutorial- Download the Model for Practice (Select the Free version on the right side): https://blendermarket.com/products/kitchen-scene--tutorial- Nature Assets: https://blendermarket.com/products/shaker-trees-nature-for-blender-realistic-trees/?ref=7751 Furniture Pack: https://blendermarket.com/products/furniture-pack---ultimat?/?ref=7751 Decoration Pack: https://blendermarket.com/products/decoration-collection---luxury-interior-decoration-collection/?ref=7751 MENTIONED LINKS:FSpy: https://fspy.io PureRef: https://www.pureref.com Better Bloom: https://llennoco.gumroad.com/l/BetterBloom What You'll Learn:- How to model an interior from scratch- Applying realistic textures and materials for a professional look- Advanced lighting techniques to enhance realism- Efficient technique to speed up your workflow- Tips and tricks for creating detailed and convincing kitchen scenesIf you would like to support us, please visit our shop: https://www.3dshaker.com/ If you are interested in our other commercial projects, see the portfolio: https://www.zorestudio.com/ Dont forget to subscribe for more Blender tutorials and 3D art tips! If you found this video helpful, leave a like and a comment!_________________________________________________Follow us:https://www.instagram.com/3dshaker_models/ https://www.facebook.com/3Dshaker #Blender #BlenderTutorial #InteriorDesign #3DModeling #KitchenRender #Photorealism #BlenderRendering #architecturalvisualization
    0 Comments ·0 Shares ·43 Views
  • Blender Tutorial: How to Use Dynamic Paint in 3 Creative Ways
    www.youtube.com
    More physics from Kenny Phases: https://b3d.cgcookie.com/6g4kzv Kenny Phases guides you through his three favorite uses of Blender's Dynamic Paint tool, which is great for physics effects. Kenny covers the fundamentals of the tool first, followed by fully-rendered projects that apply the techniques."WHO IS CG COOKIE?"We are real people! (OK, maybe some of us are cyborgs - we don't ask.) CG Cookie is a small crew of Blender artists, baking fresh videos for the Blender community. If you love what we do, consider enrolling to http://cgcookie.com to stream 100's of Blender courses with passionate Blender instructors there to answer your questions. "WHERE SHOULD I START LEARNING BLENDER?"For Blender beginners, we have a free tutorial series "Getting Started with Blender" https://rb.gy/khqdl7 "I WANT MORE CG COOKIE IN MY LIFE!"Got it. Here's where you can reach us!http://instagram.com/cgcookie http://twitter.com/cgcookie http://facebook.com/cgcookieinc Want Blender news in your mailbox? Sign up here for spam-free newsletter https://cgcookie.com/newsletter #CGCookie #blendertutorial #b3d
    0 Comments ·0 Shares ·51 Views
  • $38 buys you an AI-powered personal assistant for life
    www.popsci.com
    Its 2025, and we dont have flying cars or talking robots yet. Fortunately, we do have some cool apps courtesy of artificial intelligence, and DeskSense is one of them.DeskSense provides a personal assistant at your beck and call, and you can currently score a lifetime subscription to their basic plan for just $38the best price on the webright here for a limited time.Admit it, youve always wondered what it would be like to be a rich billionaire with a fleet of employees. While you may not have a Jeeves to bring you coffee, now DeskSense can craft that important email for you or translate content in seconds.As the #1 AI-powered personal assistant on the market, DeskSense works with Google Chrome and Edge browsers as an extension and provides help anytime. Chat with it instantly from any webpage as you browse or pop inside the Web app and start up a conversation. Theyll all be auto-saved for your future convenience, too.Overwhelmed with work? Let DeskSense take some things off your plate. Ask it to create your marketing content, write a blog post, or develop coding solutions. Need an image for social media? It can also create images.Set DeskSense up with informative YouTube videos and ask it to summarize them for your understanding, or have it summarize a news article with just one click. DeskSense is always ready to save you time and make life easier.This basic plan includes all AI features, an unlimited prompt library, and unlimited storage. Youll also access 43,200,000 credits a month, 25 AI image generations a month, 24/7 email support, and early access to new features and AI models.Score your very own personal assistant right on your browser for just $38 with a lifetime subscription to DeskSense AI Assistants basic plan.StackSocial prices subject to change.DeskSense AI Assistant Basic Plan: Lifetime Subscription $38See Deal
    0 Comments ·0 Shares ·44 Views
  • As AI advances, the meaning of artificial general intelligence remains murky
    www.sciencenews.org
    NewsArtificial IntelligenceAs AI advances, the meaning of artificial general intelligence remains murkyTesting for AGI may not be the best measure of AIs abilities and impacts A display at the March 2025 Mobile World Congress in Barcelona touts advances in artificial intelligence. The goal of artificial general intelligence, however, remains ill-defined and controversial.Josep Lago/AFP via Getty ImagesBy Lauren Leffer42 seconds agoWhen Chinese AI startup DeepSeek burst onto the scene in January, it sparked intense chatter about its efficient and cost-effective approach to generative AI. But like its U.S. competitors, DeepSeeks main goal is murkier than just efficiency: The company aims to create the first true artificial general intelligence, or AGI.For years, AI developers from small startups to big tech companies have been racing toward this elusive endpoint. AGI, they say, would mark a critical turning point, enabling computer systems to replace human workers, making AI more trustworthy than human expertise and positioning artificial intelligence as the ultimate tool for societal advancement.
    0 Comments ·0 Shares ·55 Views
  • Public-health experts should be more political, not less
    www.nature.com
    Nature, Published online: 11 March 2025; doi:10.1038/d41586-025-00728-6Health has always been political, long before Donald Trump and Robert F. Kennedy Jr took power. Denying this is whats been killing us.
    0 Comments ·0 Shares ·54 Views
  • Similar chiral phenomena occur in cell cultures and human crowds
    www.nature.com
    Nature, Published online: 11 March 2025; doi:10.1038/d41586-025-00716-wSimilar chiral phenomena occur in cell cultures and human crowds
    0 Comments ·0 Shares ·53 Views
  • China creates powerful spy satellite capable of seeing facial details from low orbit
    www.livescience.com
    New laser-based imaging technology is reportedly capable of capturing millimeter resolution from over 60 miles away.
    0 Comments ·0 Shares ·50 Views
  • Apple Watch Series 10 hits its lowest-ever price this Apple deal is just too good to miss
    www.livescience.com
    Amazon has dropped the Apple Watch Series 10 price by $100 and it's also price-matched at Walmart and Best Buy
    0 Comments ·0 Shares ·51 Views
  • Kaguya Ootsutsuki 3D Render
    www.reddit.com
    submitted by /u/SoiriNeko [link] [comments]
    0 Comments ·0 Shares ·58 Views