HSBC Using Quantum To Protect Against Cyber Threats

Banking giant HSBC is to test a pilot quantum-secured metro network in London, as it wants to be ready for future security threats. HSBC has officially announced that it is joining BT and Toshiba’s quantum-secured metro network, connecting two UK sites using Quantum Key Distribution (QKD) to prepare its global operations against future cyber threats.

HSBC will trial the quantum secure transmission of test data over fibre-optic cables between its global HQ in Canary Wharf and a data centre in Berkshire, 62km away.

QKD uses particles of light and the fundamental properties of quantum physics to deliver secret keys between parties. These keys can be used to encrypt and decrypt sensitive data and are safe from eavesdroppers or cyber-attacks by quantum computers. The technology will be trialled in multiple scenarios, including financial transactions, secure video communications and one-time-pad encryption.

HSBC Europe's CEO Colin Bell commented, “Our customers, clients and employees expect us to have safe and secure operations and resilient cyber security, so we must stay ahead of the curve... That is why we are already preparing our global operations for a quantum future. We are spearheading industry-leading trials, recruiting highly trained experts, and investing in strong, strategic partnerships to explore how we could deploy these technologies as they develop."

HSBC has been stepping up its efforts in quantum computing over the last year, forming a multi-year deal with IBM to investigate the technology and actively recruiting research scientists to build a dedicated capability within its innovation team.

In June, HSBC also formed a partnership with Quantinuum, a joint venture tberween Cambridge Quantum and Honeywell, with an initial focus on cyber security.

HSBC:      Finextra:   FinextraInfosecurity Magazine:    DealTown:   The Register

You Might Also Read: 

Britain Pledges To Invest £2.5bn In Quantum Computing:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« TrueBot: Cyber Security Agencies Issue A Warning
The Most Used Malware In H1 2023 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

TBG Security

TBG Security

TBG provides a portfolio of services including cyber security, compliance and continuity solutions.

ContentKeeper

ContentKeeper

ContentKeeper provides Web Threat Protection solutions to secure today’s Web 2.0 and mobile centric business environments.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

Cyversity

Cyversity

Cyversity's mission (formerly ICMCP) is the consistent representation of women and underrepresented minorities in the cybersecurity industry.

HCL Technologies

HCL Technologies

HCL offer an integrated portfolio of products, solutions and services built around Digital, IoT, Cloud, Automation, Cybersecurity, Analytics, Infrastructure Management and Engineering Services.

Padlock

Padlock

Padlock is a trusted platform with an intimate knowledge of the cybersecurity industry that connects businesses with freelance professionals

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

HITRUST Alliance

HITRUST Alliance

HITRUST provides widely-adopted common risk and compliance management frameworks, related assessment and assurance methodologies.

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

FYEO

FYEO

FYEO is a threat monitoring and identity access management platform for consumers, enterprises and SMBs.

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

RegScale

RegScale

RegScale helps organizations comply in real-time with multiple compliance requirements (NIST, CMMC, ISO, SOX, etc), scalable to meet the needs of the entire enterprise.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

Traced

Traced

TRACED is changing the detection paradigm. Empowering defenders to go on the offense to engage cyber attackers before they compromise your organization.