Slides Framework
    • current state of data security

      The quest for data resiliency

  • Human civilisation today has come to rely on one thing above all else – data. With the transformative impact of digitisation, all our lives and businesses are inexplicably intertwined with more data than ever before.

This dependency has, however, become the source of our greatest vulnerability. Malicious actors with access to data often manipulate data in a manner that benefit them at the expense of everyone else.

The World Economic Forum has classified cyber-attacks and data theft amongst the most severe and likely threats to our economy and civilisation. Data resiliency has today become an existential quest.

  • The severity of data breaches is growing exponentially

    In recent years, as the migration of data to the cloud has increased exponentially, the number of data breaches and the amount of data being compromised has also seen a corresponding increase. The number of organisations that experienced breaches in a year has increased from 21% in 2016* to 36% in 2018*.And as more IOT devices are connected to the internet, the breaches are only stated to increase exponentially.

    *Thales (2018). 2018 THALES DATA THREAT REPORT.

    • Data breaches in USA
    • breach level index
  • Grave threats to current fail-safe encryption standards

    Almost every security infrastructure known to man is reliant on encryption to keep our data safe. But with tremendous advances in computing power, the emergence of quantum simulators and eventually the migration to quantum computing the encryption infrastructure as we know it today will cease to exist. With encryption gone, our way of life and even human civilisation will alter in ways we cannot even begin to imagine.

    • Step 1

      RSA & AES are compromised

      Powerful algorithms like Shor’s algorithm and Grover’s algorithm running on equally powerful computers are able to crack current encryption standards.

    • Step 2

      Quantum Simulators

      Quantum Simulators use classical computers to simulate the computational power that Quantum Computing brings and is being used to crack current encryption standards.

    • Step 3

      Quantum Computers

      Quantum Computers will render all known encryption. National security cryptographic infrastructure will be compromised and Nation States will face instability. Trust Zones that are the backbone of e-commerce today will be dismantled.

Targeted harvest & decrypt attacks are increasing

With encryption vulnerable to brute force attacks, threat actors are increasingly taking to harvest and decrypt attacks. What makes these attacks possible is the physical susceptibility of our networks. Anyone can today physically tap into the optical fibres and clone the data without raising any alerts. After cloning data and the public keys used to encrypt data, data can be decrypted at a later date without raising any suspicion.

  • With so much at stake, we at QNu questioned everything we know about current data security paradigms. What we found was that the reliance on mathematics-based encryption to keep our data safe were based on the assumption that computing power would never pose a threat to it.