Qwoted is a free expert network: we help reporters connect with experts & we help those same experts build relationships with top reporters.
Event Date |
Tue Feb 28 UTC (almost 2 years ago)
In your timezone (EST): Mon Feb 27 7:00pm - Mon Feb 27 7:00pm |
Location | Webinar |
Region | All |
When we created the backbone of our current device authentication system, PKI, we did not intend to create certificates that have become the target for attackers to steal and the point of entry for approximately 80% of successful data breaches. The purloined credential has given rise to the growth of progeny technology in Two Factor Authentication to deal with the vulnerability created by the strong, but stealable certificate meant to protect.
Adding insult to the injury, we frequently find ourselves codifying the revenge effect’s vulnerability into industry standards and regulations. We have done this with PKI. This codification stifles innovation and perpetuates the vulnerability and at the end of the day creates a safe harbor of a predictable future for attackers.
We may be approaching an opportunity to break the hold of the revenge effect. It appears to some that quantum computing could become both a technical and commercial reality. As we contemplate what that could mean, we should pause for a moment and contemplate what unintended consequences might be lurking in the quantum shadows.
2023 Speakers
John Ellingson
CTO, QWERX
Mike Wardle
CEO & Head of Indices, Z/Yen Group