Dark
Light

IBM’s vision for cybersecurity: Passkeys, Deepfakes, Quantum Computing

1 min read
48 views

TLDR:

IBM’s Chris Hockings predicts a safer internet with advancements in passkey technology, digital identity, deepfake defenses, and post-quantum cryptography. He believes that the internet will be significantly safer in the coming years due to technological progress. Passkey adoption in Australia is lagging behind, but digital identity systems are making strides in reducing the risk of breaches. Emerging threats like deepfakes and quantum computing pose challenges, but technological solutions exist. IBM is focusing on addressing the issues posed by quantum computing, which could render traditional encryption techniques ineffective. There is also a discussion on the cybersecurity skills shortage, with efforts being made to attract more women into the industry and leverage technology to enhance existing professionals’ effectiveness.

Key Points:

  • Advances in passkey tech, digital identity, deepfake defenses, and post-quantum cryptography will make the internet safer
  • Passkey adoption in Australia is progressing, reducing the risk of breaches
  • Challenges posed by deepfakes and quantum computing are being addressed with technological solutions
  • Efforts to address the cybersecurity skills shortage and attract more women into the industry are ongoing

IBM’s Chris Hockings discusses the future of cybersecurity, emphasizing the role of passkey technology, digital identity, and post-quantum cryptography in making the internet a safer place. While challenges like deepfakes and quantum computing loom on the horizon, Hockings is optimistic about the advancements in technology to counter these threats. The cybersecurity skills shortage is also a focal point, with efforts being made to attract more women into the industry and leverage technology to enhance existing professionals’ effectiveness. Overall, the article highlights the importance of technological innovation and collaboration in addressing cybersecurity challenges.

Previous Story

Revolutionize cybersecurity threat detection with open XDR technology

Next Story

Don’t let vulnerabilities allow attackers to run harmful code

Latest from News