The Quantum Computing Threat

The secret sauce of quantum computing, which even Einstein called "spooky," is the ability to generate and manipulate quantum bits of data or qubits. Certain computational tasks can be executed exponentially faster on a quantum processor using qubits, than on a classical computer with 1s and 0s. A qubit can attain a third state of superimposition of 1s and 0s simultaneously, encode data into quantum mechanical properties by "entangling" pairs of qubits, manipulate that data and perform huge complex calculations very quickly.
The timeline of human history is marked by inflection points of major technological advancement. The plow, the printing press, the telegraph, the steam engine,...
In my previous post I argued that if Canada wants to succeed with its AI-focused innovation agenda, it should also be at the forefront...
If you've ever been to an expensive restaurant and ordered a familiar dish like, say, lasagna, but received a plate with five different elements...
Because it demands so much manpower, cybersecurity has already benefited from AI and automation to improve threat prevention, detection and response. Preventing spam and identifying malware are already common examples. However, AI is also being used – and will be used more and more – by cybercriminals to circumvent cyberdefenses and bypass security algorithms. AI-driven cyberattacks have the potential to be faster, wider spread and less costly to implement. They can be scaled up in ways that have not been possible in even the most well-coordinated hacking campaigns. These attacks evolve in real time, achieving high impact rates.
In 2013, George F. Young and colleagues completed a fascinating study into the science behind starling murmurations. These breathtaking displays of thousands – sometimes...
Not even 30 years separate us from the end of the Cold War. Yet, we appear to be witnessing the emergence of a new...
Emerging Technology and Geopolitics of 5G There are several reasons emerging technology is a highly competitive industry, notwithstanding the race for intellectual property that can...
Hyped as the technology that will transform the world, 5G is moving past the buzzword stage with first implementations coming to life in 2019....
Don’t let the “5G” in the title confuse you. This post is not only about the telcos’ core networks, but about the 5G security...
More than half of the world’s population lives in cities. The UN estimates that by 2050 that proportion will be 68% - more than...
Since the dawn of the 21st Century, the ways in which people and organizations that use the Internet experience, perceive and act in the...
Recent events have confirmed that the cyber realm can be used to disrupt democracies as surely as it can destabilize dictatorships. Weaponization of information and malicious dissemination through social media pushes citizens into polarized echo chambers and pull at the social fabric of a country. Present technologies enhanced by current and upcoming Artificial Intelligence (AI) capabilities, could greatly exacerbate disinformation and other cyber threats to democracy.
From The Jetsons to Blade Runner, to Back to the Future, to A.I. to The 5th Element, popular culture has long been fascinated by...
Getting smart about security in smart systems Smart used to be something we called people or pets. It wasn't a term one would use to...