-
Society 5.0
Whispering Buildings and Things That Listen to Us in the Night
How important privacy is for building smart cities and embracing the IoT In the 60s cartoon The Jetsons, the family lived in a futuristic city with flying cars, a robotic housekeeper, and even a watch that let you do video…
Read More » -
Post-Quantum, PQC, Quantum Security
Shor’s Algorithm: A Quantum Threat to Modern Cryptography
Shor’s Algorithm is more than just a theoretical curiosity – it’s a wake-up call for the security community. By understanding its principles and implications, we can appreciate why the cryptographic landscape must evolve. The goal of this guide is to…
Read More » -
Quantum Computing
Quantum Fourier Transform (QFT)
Quantum Fourier Transform (QFT), like a physical Fourier transform, takes a time-domain wave and represents it in the frequency domain. In the quantum case, the “time-domain” is the computational basis amplitude distribution, and the “frequency-domain” is another basis where the…
Read More » -
Post-Quantum, PQC, Quantum Security
Grover’s Algorithm and Its Impact on Cybersecurity
Grover’s algorithm was one of the first demonstrations of quantum advantage on a general problem. It highlighted how quantum phenomena like superposition and interference can be harnessed to outperform classical brute force search. Grover’s is often described as looking for…
Read More » -
Quantum Computing
Hadamard Gate: The Gateway to Superposition
The Hadamard gate takes a qubit and puts it into an equal superposition of “0” and “1” (with a relative phase of + or -). It has a simple matrix but a profound impact: it enables parallelism and interference in…
Read More » -
Post-Quantum, PQC, Quantum Security
The Hidden Subgroup Problem (HSP): One Framework to Break Them All
Every public-key cryptosystem deployed today - RSA, Diffie-Hellman, and elliptic curve cryptography - falls to a single mathematical framework called the Hidden Subgroup Problem (HSP). This is not a coincidence: Shor's algorithm, in each of its variants, works by exploiting…
Read More » -
Post-Quantum, PQC, Quantum Security
Quantum-Safe vs. Quantum-Secure Cryptography
In 2010, I was serving as an interim CISO for an investment bank. During that time, I was already trying to figure out the risks posed by quantum computing. One day, I was approached by a vendor who, with great…
Read More » -
Crypto Security
How Hong Kong’s FinTech sector is developing
The global financial services sector is accelerating its transformation in response to changing values and shifting consumer preferences. Hong Kong is responding in its own unique way. Global events over the last decade have brought home the reality that we…
Read More » -
Cyber-Kinetic Security
History of Cyber-Kinetic Incidents and Research
The fact that cyber-kinetic attacks rarely appear on mainstream news doesn’t mean they don’t happen. They happen more frequently than you would think. Many, for various reasons, aren’t even reported to agencies charged with combatting them. This hinders security experts…
Read More » -
Quantum Computing
Quantum Superposition: How Qubits Live in Many States at Once
Quantum computing promises to solve problems that stump even the fastest classical supercomputers. At the heart of this promise is a mind-bending phenomenon: quantum superposition. In simple terms, superposition allows quantum bits—or qubits—to occupy multiple states at the same time,…
Read More » -
Quantum Computing
Colliding Waves: How Quantum Interference Powers Quantum Computing
Quantum interference remains the cornerstone of quantum computing’s promise. It’s the feature that distinguishes quantum computation from just a random quantum jumble. A quantum computer is not powerful simply because it can have many states at once – if that…
Read More » -
Leadership
Diversity – The Benefits of Being Uncomfortable
The topic of diversity is not one that most people find in their comfort zone. As I wrote in a previous article on diversity, increasing diversity often engenders frustration in those tasked with accomplishing it, and inspires eye rolls among diversity-fatigued…
Read More » -
AI Security
The 1956 Dartmouth Workshop: The Birthplace of Artificial Intelligence (AI)
In the summer of 1956, a small gathering of researchers and scientists at Dartmouth College, a small yet prestigious Ivy League school in Hanover, New Hampshire, ignited a spark that would forever change the course of human history. This historic…
Read More » -
Crypto Security
Blockchain Security
Recent advances in Distributed Ledger Technology (DLT) / Blockchain have significant implications for the global economy and financial services FinTech and Decentralized Finance (DeFi) solutions. Blockchain is a set of technologies that through distributed computing and mathematics can now deliver…
Read More » -
Crypto Security
Cybersecurity of Blockchain & Blockchain for Cybersecurity
You may have heard, over the last year or two, about the new technological miracle that is the blockchain. It seems that every banker, insurer, manufacturer, artist, lawyer and cybersecurity professional is shouting about blockchain from the highest peak and…
Read More »