mastodon.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
A newer server operated by the Mastodon gGmbH non-profit

Server stats:

11K
active users

#cybersecurity

3.4K posts795 participants229 posts today
Volodymyr<p>📌 [Cybersecurity Tip #5]</p><p>“Use a VPN on public WiFi! Hackers can spy on unprotected networks. Secure your connection.”</p><p>🔒 Stay secure</p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
collective zero<p>"Wir stärken die Resilienz unseres Landes durch die Erhöhung der IT-Sicherheit, insbesondere bei kritischen Infrastrukturen und machen sie zu einem zentralen Handlungsfeld der Digitalstrategie"<br>Ja, was denn sonst?!<br><a href="https://ipv6.social/tags/koalitionsverhandlungen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>koalitionsverhandlungen</span></a> <a href="https://ipv6.social/tags/cdu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cdu</span></a> <a href="https://ipv6.social/tags/spd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spd</span></a> <a href="https://ipv6.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://ipv6.social/tags/DigitaleSouver%C3%A4nit%C3%A4t" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitaleSouveränität</span></a> <br><a href="https://www.lto.de/recht/hintergruende/h/koalitionsverhandlungen-digitales-datenschutz-ki-digital-ministerium" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lto.de/recht/hintergruende/h/k</span><span class="invisible">oalitionsverhandlungen-digitales-datenschutz-ki-digital-ministerium</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/AIs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIs</span></a> as Trusted Third Parties</p><p><a href="https://www.schneier.com/blog/archives/2025/03/ais-as-trusted-third-parties.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/03/ais-as-trusted-third-parties.html</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/TTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TTP</span></a></p>
urlDNA.io<p>Possible Phishing 🎣<br> on: ⚠️hxxps[:]//e-zpassnypnj[.]com/<br> 🧬 Analysis at: <a href="https://urldna.io/scan/67e82b493b7750000d7b3a83" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">urldna.io/scan/67e82b493b77500</span><span class="invisible">00d7b3a83</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/urldna" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>urldna</span></a> <a href="https://infosec.exchange/tags/scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scam</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
ActiveState<p>Want to level up your security game in 2025? 🔐</p><p>We’ve curated the Top 5 DevSecOps Events you can’t miss this year! These events are perfect for developers, security pros, and DevOps teams looking to stay ahead of open source security trends and strengthen their software supply chains.</p><p>Discover where to learn, connect, and innovate: <a href="https://www.activestate.com/blog/level-up-your-security-game-top-5-devsecops-events-to-attend-in-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">activestate.com/blog/level-up-</span><span class="invisible">your-security-game-top-5-devsecops-events-to-attend-in-2025/</span></a> </p><p><a href="https://mastodon.social/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/SecureSoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureSoftware</span></a></p>
Pyrzout :vm:<p>Lotus Blossom APT Exploits WMI for Post-Exploitation Activities <a href="https://cybersecuritynews.com/lotus-blossom-apt-exploits-wmi/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersecuritynews.com/lotus-bl</span><span class="invisible">ossom-apt-exploits-wmi/</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Pyrzout :vm:<p>CISA Warns of ESURGE Malware Exploiting Ivanti RCE Vulnerability <a href="https://cybersecuritynews.com/cisa-warns-of-esurge-malware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersecuritynews.com/cisa-war</span><span class="invisible">ns-of-esurge-malware/</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/VulnerabilityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityNews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a></p>
Voxel<p><strong>But I'm Reviewing Skiff and Proton Mail</strong></p><p><a href="https://www.youtube.com/watch?v=iH626CXyNtE" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=iH626CXyNtE</span><span class="invisible"></span></a></p><p>by "By Default".</p><p><strong>2 corrections:</strong></p><ul><li><a href="https://skiff.com/" rel="nofollow noopener" target="_blank">Skiff no longer exists as back then</a></li><li>Addy.io let you set a public PGP key which prevents your email provider from reading emails coming through Addy.io aliases</li></ul><p><strong>Disclaimer:</strong><br>I do not agree with everything said in this video, but I still believe it's informative and clarifies some common misconceptions.</p><p><a href="https://infosec.space/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://infosec.space/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://infosec.space/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.space/tags/email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>email</span></a> <a href="https://infosec.space/tags/protonmail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>protonmail</span></a> <a href="https://infosec.space/tags/tutamail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tutamail</span></a></p>
Steele Fortress<p>In a landscape of rising cyber threats, collaboration is essential to bridge the gap in cybersecurity capabilities. Accenture's Jacky Fox emphasizes the need for collective action to address inequities. How are you fostering collaboration in your cybersecurity efforts? <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a></p><p>Read more: <a href="https://short.steelefortress.com/7sxy9b" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">short.steelefortress.com/7sxy9b</span><span class="invisible"></span></a></p>
urlDNA.io<p>Possible Phishing 🎣<br> on: ⚠️hxxps[:]//eehhing[.]top<br> 🧬 Analysis at: <a href="https://urldna.io/scan/67e823ec3b7750000e33e8e3" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">urldna.io/scan/67e823ec3b77500</span><span class="invisible">00e33e8e3</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/urldna" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>urldna</span></a> <a href="https://infosec.exchange/tags/scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scam</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Hourly Jobs | TotalCyber.io<p>🚀 Data Loss Prevention Analyst<br>🏢 London Stock Exchange Group<br>📍 Multiple locations</p><p>🔗 Apply now: <a href="https://totalcyber.io/jobs/london-stock-exchange-group/data-loss-prevention-analyst-1" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">totalcyber.io/jobs/london-stoc</span><span class="invisible">k-exchange-group/data-loss-prevention-analyst-1</span></a></p><p><a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/job" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>job</span></a> <a href="https://infosec.exchange/tags/mastodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mastodon</span></a> <a href="https://infosec.exchange/tags/fediverse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fediverse</span></a> <a href="https://infosec.exchange/tags/fedihire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fedihire</span></a> <a href="https://infosec.exchange/tags/fedijobs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fedijobs</span></a> <a href="https://infosec.exchange/tags/getfedhired" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>getfedhired</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/hiring" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hiring</span></a> <a href="https://infosec.exchange/tags/gethired" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gethired</span></a> <a href="https://infosec.exchange/tags/joboffer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>joboffer</span></a> <a href="https://infosec.exchange/tags/flossjobs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>flossjobs</span></a> <a href="https://infosec.exchange/tags/jobhunt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jobhunt</span></a></p>
IntelVictims<p>-ランサムウェア攻撃 アラート-<br>公開日時: 2025-03-29 16:34:17.952417<br>被害企業: Martin Mechanical (martin.local)<br>ランサムグループ: lynx<br><a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/%E3%82%B5%E3%82%A4%E3%83%90%E3%83%BC%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>サイバーセキュリティ</span></a> <a href="https://mastodon.social/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://mastodon.social/tags/%E3%83%A9%E3%83%B3%E3%82%B5%E3%83%A0%E3%82%A6%E3%82%A7%E3%82%A2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ランサムウェア</span></a></p>
Sam Chavez<p>Hi y’all! 👋🏽 <a href="https://federate.social/tags/signalgate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>signalgate</span></a> is about more than ridiculous people running our <a href="https://federate.social/tags/foreignpolicy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>foreignpolicy</span></a></p><p>In this week's private podcast feed, we get into the Signal chat heard 'round the world and what it means for our privacy and security. </p><p>We the People are under threat by our own government. We talk about how we take back our power! <a href="https://federate.social/tags/activism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activism</span></a> <a href="https://federate.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://federate.social/tags/fascism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fascism</span></a></p><p>🎙️ Listen or watch: <br><a href="https://knurdology.com/podcast/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">knurdology.com/podcast/</span><span class="invisible"></span></a></p>
CTI.FYI<p>🚨New ransom group blog post!🚨</p><p>Group name: lynx<br>Post title: Martin Mechanical (martin.local)<br>Info: <a href="https://cti.fyi/groups/lynx.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cti.fyi/groups/lynx.html</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
The New Oil<p>Italian government reportedly admits targeting activists</p><p><a href="https://www.euractiv.com/section/politics/news/spyware-scandal-italian-government-reportedly-admits-targeting-activists/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">euractiv.com/section/politics/</span><span class="invisible">news/spyware-scandal-italian-government-reportedly-admits-targeting-activists/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spyware</span></a> <a href="https://mastodon.thenewoil.org/tags/Italy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Italy</span></a> <a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/politics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>politics</span></a></p>
Victoria Riess, MBA<p>QC 11 - Potential ability to break traditional encryption <a href="https://mastodon.social/tags/quantumcomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quantumcomputing</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a></p><p>A summary of the 11 Steps of Quantum computing, Cryptocurrencies and Cybersecurity from Victoria Riess</p><p>Each step is explained in detail in Victoria Riess' Is quantum computing about to break cryptocurrency keynote available for free at <a href="https://youtu.be/CjyGIauXJwg" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/CjyGIauXJwg</span><span class="invisible"></span></a></p><p><a href="https://bit.ly/43cmkeG" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/43cmkeG</span><span class="invisible"></span></a><br><a href="https://youtu.be/IpFwYvDk3Gc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/IpFwYvDk3Gc</span><span class="invisible"></span></a><br><a href="https://bit.ly/3ZSb0kU" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/3ZSb0kU</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/quantumcomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quantumcomputing</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptocurrency</span></a></p>
urlDNA.io<p>Possible Phishing 🎣<br> on: ⚠️hxxps[:]//thr-dana-kaget-2025[.]xcz[.]my[.]id<br> 🧬 Analysis at: <a href="https://urldna.io/scan/67e809f53b7750000e33e8ba" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">urldna.io/scan/67e809f53b77500</span><span class="invisible">00e33e8ba</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/urldna" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>urldna</span></a> <a href="https://infosec.exchange/tags/scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scam</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Victoria Riess, MBA<p>QC 10 - How should crypto prepare for ‘quantum supremacy’? <a href="https://mastodon.social/tags/quantumcomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quantumcomputing</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a></p><p>Get concerned! The future is here: if a fault-tolerant quantum computer with enough logical qubits is built, some data will likely be compromised! Sounds worrying… if only you knew how to prepare for ‘quantum supremacy’.</p><p>To help you mitigate the large risk a quantum computer poses to current protocols, Victoria Riess has post-quantum cryptography</p><p><a href="https://bit.ly/43cmkeG" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/43cmkeG</span><span class="invisible"></span></a></p><p><a href="https://youtu.be/CjyGIauXJwg" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/CjyGIauXJwg</span><span class="invisible"></span></a></p>
Victoria Riess, MBA<p>QC 09 - What new ways are in place to save crypto from ‘quantum supremacy’? <a href="https://mastodon.social/tags/quantumcomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quantumcomputing</span></a> <a href="https://mastodon.social/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a></p><p>'Quantum supremacy' is no longer science fiction... it's a real threat to blockchain-based cryptocurrencies. But here are the new ways that are in place to save crypto from ‘quantum supremacy’ by Victoria Riess.</p><p>Be sure to check out the rest of the QC keynote playlist here: <a href="https://bit.ly/43cmkeG" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/43cmkeG</span><span class="invisible"></span></a></p><p><a href="https://youtu.be/CjyGIauXJwg" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/CjyGIauXJwg</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/quantumcomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quantumcomputing</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptocurrency</span></a></p>
Victoria Riess, MBA<p>QC 08 - When will quantum computer break classical cryptographic ciphers? <a href="https://mastodon.social/tags/quantumcomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quantumcomputing</span></a> <a href="https://mastodon.social/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a></p><p>Since quantum computing is around for decades, when will a quantum computer break classical cryptographic ciphers? Watch the latest insights from Victoria Riess.</p><p>Be sure to check out the rest of the QC keynote playlist here: <a href="https://bit.ly/43cmkeG" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/43cmkeG</span><span class="invisible"></span></a></p><p>If you prefer to learn in bulk, you can access the entire keynote here: <a href="https://youtu.be/CjyGIauXJwg" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/CjyGIauXJwg</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/quantumcomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quantumcomputing</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptocurrency</span></a></p>