Power Of Nature To Enhance Internet Security

Nature has provided insights for engineers for years, inspiring technical solutions to challenges that replicate the elegant perfection of approaches that work in the natural world. 

The next generation of cybersecurity is being enabled by the quantum nature of the universe itself.

Solutions inspired by nature are being applied to diverse fields including energy production, medicine and healthcare, architecture, food production, transportation and manufacturing. (image: quantum phase diagram is the Hofstadter butterfly)

Nature is now providing engineers with the missing link that can help with the most vexing challenge of our age: enabling both security and functionality in our interconnected IT systems. 

Next generation cybersecurity is needed right now. Cyberattacks are increasing across multiple industries and every level of government. Over the last decade, attacks have been directed against governments, academia, financial institutions, businesses in every sector, and even individuals and their homes. 

In Europe, attacks have damaged the energy sector, and many believe more onslaughts against critical infrastructure and services are in our future. Attacks can even impact the safety of our cars, as hackers have shown they can successfully take over systems embedded in vehicles, and entire airports have been shut down by assaults against the aviation industry. 

Attacks in the healthcare sector have violated the privacy of hundreds of millions of patients and have disrupted hospital and emergency care. Attacks have also been conducted against political campaigns as far back as 2008. The escalation of these attacks in 2016 is raising fears that cyberattacks against electoral systems will threaten democracy itself.

All indications are that these assaults will continue. Adversaries, including cyber criminals, states seeking national security information, hackers seeking glory, and hacktivists pushing causes, have all come to realise the value of successful cyberattacks, and they show no sign of stopping. 

Defenders need to leverage security solutions that increase the amount of effort required by criminals while ensuring the freedom of action and functionality in our protected systems.  Current approaches are all variants of a security theme from the 1990’s called “Defense in Depth,” where security is layered on at every point in the IT stack. 

Security solutions are run on end devices, in networks, on servers, in the cloud and everywhere in between. This approach mitigates risk when properly engineered and overseen, but it is always expensive. Defense in depth has become expense in depth.  And still, adversaries find ways to get in.

Besides expense, today’s defense in depth faces several technological challenges. Engineers in academia, industry and government have designed approaches to address these challenges, including mechanisms like Hardware Security Modules (HSMs) to safeguard and manage security keys for authentication and conduct encryption and decryption. 

Until now, the state of art of HSM devices kept them out of reach of most businesses. Now, breakthroughs in innovation based on quantum effects, advances in key and policy management techniques are being coupled with HSM devices, turning them into more powerful tools capable of generating, managing, and safeguarding large numbers of the most secure encryption keys possible.

All encryption keys require random numbers. The most sophisticated random number generation algorithm that can possibly be created by humans using conventional computers will still only generate pseudo-random numbers. Pseudo-random algorithms are mathematically predictable.      

The one place where nature appears the most random is in a special quantum effect observable by specialized equipment. At a quantum level, sometimes matter just appears. Then it disappears almost as fast as it appeared.  It does this in ways no one can predict, and can be utilized to generate truly random numbers. By building solutions based on a foundation of truly random numbers for key generation, new levels of trust and security can be engineered into our systems.

Quantum effects are being leveraged to generate random numbers at high rates and in ways that make guessing keys impossible, removing an important attack avenue for cyber criminals. Until this quantum effect was used, every other accepted method was not truly random, or was too slow to deliver the security really needed. 

CTOVision:            IBM breakthrough in Quantum Computing:
 

 

« Snowden Loses In Norway
AI Beating Humans? Not In My lifetime, Says Google Chief »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Link11 GmbH

Link11 GmbH

Link11 provides DDoS protection solutions to protect websites and complete server infrastructures from DDoS attacks.

Baker McKenzie

Baker McKenzie

Baker & McKenzie is an international law firm. Practice areas include Data & Technology.

a1qa

a1qa

a1qa specializes in the delivery of full-cycle software QA and application testing services.

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

ICS2

ICS2

ICS² is the first cyber security company focusing on protecting the control system of power, oil, gas, and petrochemicals plants.

PhishX

PhishX

PhishX is a SaaS platform for security awareness that simulates Cyberthreats, train people, while measure and analysis results, reducing Cybersecurity risks for People and Companies.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

Sigma IT

Sigma IT

SIGMA IT is one of the largest IT services organizations in EMEA region providing a full range of solutions and services including cybersecurity, data protection and business continuity.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

Mjenzi Cloud

Mjenzi Cloud

Mjenzi Cloud is a provider of cloud IaaS solutions including managed backup services, affordable & secure cloud virtual compute/storage/compute services, bare-metal services and cloud security.

Cyturus Technologies

Cyturus Technologies

Cyturus Technologies delivers cybersecurity business risk quantification services using our proprietary Adaptive Risk Model (ARM).

UTMStack

UTMStack

UTMStack is a Unified Security Management system that includes SIEM, Vulnerability Management, Network and Host IDS/IPS, Asset Discovery, Endpoint Protection and Incident Response.

NWN Corp

NWN Corp

NWN Corporation is a leading Cloud Communications Service Provider (CCSP) focused on transforming the customer and workspace experience for commercial, enterprise and public sector organizations.

Conversant Group

Conversant Group

Conversant Group is an IT infrastructure and security consulting company, providing technical, organizational, procedural, and process consulting internationally.

Randaemon

Randaemon

RANDAEMON’s mission is to create True Random Number Generators (TRNG) that are hardware-based and integrated into System-on-Chip.