Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
Organizations spend enormous amounts of time and money on reducing single points of failure and diversifying risk, whether that be within our own portfolios or across supply chains. Without diversity of thought and process, we create single points of failure, from the relatively benign to the catastrophic.
Examples of single points of failure can be seen in our everyday lives. The U.S. baby formula market is so concentrated that the closure of a single factory threw the entire nation into crisis. The Germans used an “Enigma” encoding machine throughout WWII that had been previously broken by the allies in 1939, thank you, Alan Turing. This left all of the supposedly encrypted messages readable. Unarguably, however, this single point of failure had some very positive externalities.
In cybersecurity, it’s in our blood to reduce single points of failure, with the exception of encryption. Poor implementations of cryptographic suites that are meant to protect our networks are the primary means for breaking encryption of captured traffic. So are certificates captured through brute-forced passwords and cryptography due to insufficient entropy used to generate random numbers.
We are connected in ways thought unimaginable at the turn of the century, let alone back in the 1970s when public key encryption was first introduced by Diffie-Hellman. And now, we are undergoing the largest cryptographic migration in the history of computing.
MetaBeat will bring together thought leaders to give guidance on how metaverse technology will transform the way all industries communicate and do business on October 4 in San Francisco, CA.
Countering future threats to encryptio …