Presented by Douglas Stebila as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity About the presentation In this talk, I’ll give an update on the standardization and migration of cryptographic systems to quantum-resistant algorithms. I’ll talk about the current status of the NIST Post-Quantum Cryptography standardization project, …
Presented by Hussein Abulkassim as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity About the presentation The long-term success of emerging technologies such as the internet-of-things (IoT) highly depends on their ability to secure data and communications for a long time. Internet-of-drones (IoDs), as one of the …
We all have questions, but who are the people with the answers for Cybersecurity. In this series we sat down with academics and experts to ask them about how they got started, what they are researching now, their lessons for us and the future. Watch the last part of our interview with Aleksander Essex!
We all have questions, but who are the people with the answers for Cybersecurity. In this series we sat down with academics and experts to ask them about how they got started, what they are researching now, their lessons for us and the future. In this part 2, Aleksander Essex, Associate professor of software engineering …
Cryptography done right has become important as the impacts of poor implementations are increasingly felt by journalists, whistleblowers and political activists around the world. Nik Unger and Dr. Ian Goldberg at the University of Waterloo have been working on improving cryptography for messaging. Cryptography is designed to provide a level of security for messages beyond …
Heiko Mantel, Johannes Schickel, Alexandra Weber, Friedrich Weber from Technische Universität Darmstadin Germany look into potential security side effects of new energy management features in CPUs. Energy management is an issue of growing importance as the amount of resources required to process and store the massive amount of data the information society requires. Software based …
A common part of social networks is sharing images. Storing and processing these images to provide engaging services to customers is resource intensive and social networks often rely on cloud services to provide these resources. This creates a potential security risk for the users of the social network platform. Simply encrypting the images before uploading …
Dr. Mashatan is currently a faculty member at the Ted Rogers School of Information Technology Management of Ryerson University where her research focus has been on Information Systems Security and Privacy. Prior to joining Ryerson University, she was a Senior Information Security Consultant and Solutions Architect at CIBC. Prior to that Dr. Mashatan was …
Ben Buchanan looks at American Exceptionalism in the form of the NOBUS approach to signals intelligence in his contribution to the Hoover Institution’s Aegis Paper Series. There is a tension between the needs of nations in the information age to both secure and steal communications. The United States has traditionally met this by exploiting a …
Mathieu Lavoie has a B.Eng. from the École de Technologie Supérieure (E.T.S.). He is a pentester and previously worked as a malware researcher at ESET as well as a computer security freelancer. During his free time, Mathieu is an avid participant of CTFs where he developed a deep love-hate relationship with Crypto Challenges or …